Analysis

  • max time kernel
    150s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    29-01-2023 18:24

General

  • Target

    418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe

  • Size

    366KB

  • MD5

    dd065e54805dfc8c1640065803a3fa23

  • SHA1

    e0e3646919b6fdb37fd9d9d70d3c0ef23d46dc1a

  • SHA256

    418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579

  • SHA512

    5f7885acfa03411e743579b537257b68aec67e08babcf035689338663f27be082307e65adced4a7f94a413f44a141b5670872d1791b728d4ef6fb592a2b958b0

  • SSDEEP

    6144:W8afWfuCiCEfwdciYYx8+W5p56UKV4UszE7hvriQi:W6ueEMPvW8UhUszE7hvDi

Malware Config

Extracted

Path

C:\Restore-My-Files.txt

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ---------------------------------------------------------------------------------------- | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://decrmbgpvh6kvmti.onion/ | 3. Follow the instructions on this page ---------------------------------------------------------------------------------------- Note! This link is available via "Tor Browser" only. ------------------------------------------------------------ Free decryption as guarantee. Before paying you can send us 1 file for free decryption. ------------------------------------------------------------ alternate address - http://helpinfh6vj47ift.onion/ DO NOT CHANGE DATA BELOW ###s6dlsnhtjwbhr###�����������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�������������
URLs

http://decrmbgpvh6kvmti.onion/

http://helpinfh6vj47ift.onion/

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Modifies extensions of user files 7 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 27 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe
    "C:\Users\Admin\AppData\Local\Temp\418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:972
    • C:\Users\Admin\AppData\Local\Temp\418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe
      "C:\Users\Admin\AppData\Local\Temp\418a45b6d7b2b1c9615bcc5023765b25621429bc1c45702d6f43695e101da579.exe"
      2⤵
      • Modifies extensions of user files
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      PID:364

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/364-56-0x0000000000409F20-mapping.dmp
  • memory/364-59-0x0000000000400000-0x000000000040E000-memory.dmp
    Filesize

    56KB

  • memory/972-54-0x0000000075701000-0x0000000075703000-memory.dmp
    Filesize

    8KB

  • memory/972-55-0x0000000000F70000-0x0000000000FD0000-memory.dmp
    Filesize

    384KB

  • memory/972-58-0x0000000000F70000-0x0000000000FD0000-memory.dmp
    Filesize

    384KB