Analysis

  • max time kernel
    91s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-02-2024 05:14

General

  • Target

    d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe

  • Size

    53KB

  • MD5

    22ff4b883468f0b2b21b2c50d5ca5bd9

  • SHA1

    e34f09cf8f1416ab4611a6a18ff99281fad93c70

  • SHA256

    d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893

  • SHA512

    9b37dff34d3ceca993bebda8e6d3f4f4a361af65ec6bdde4be54021be2dc48c176aa0b0ef2bae8433ca2957d5e3c28fe448465c3f816a5ee36a5d395bd8f4405

  • SSDEEP

    1536:oWOeytM3alnawrRIwxVSHMweio36l990:oWOey23alnaEIN/W6lA

Malware Config

Extracted

Path

C:\ProgramData\regid.1991-06.com.microsoft\how_to_back_files.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; word-break: break-all; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">��������������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span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <hr> <b>email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> <p> <a href<a href<b> </div> </div> </div> <!--tab--> <b> <b> <b> <span style="font-size: 22px"></span> </b><br><br> </b><br> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html> ������������

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Renames multiple (6053) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe
    "C:\Users\Admin\AppData\Local\Temp\d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe > nul
      2⤵
        PID:2752

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\regid.1991-06.com.microsoft\how_to_back_files.html

      Filesize

      4KB

      MD5

      13dd354e6cf4d5c5f1c98719575cd62d

      SHA1

      dfad16d6078aa9b822967f886102b5737cb98033

      SHA256

      962ee42cc9ef825c519780823ea0c2c70fbcb53cc43cc04cb34bb7961e4fe791

      SHA512

      ea0fde3c67dd731a14b4e76837315f3e3d9d7ec1085e5450aed74959fe5714e1d3fa338c35e850847cd2fbcda9e638df841e1833a569143875ba1f17f4c7a207

    • memory/5012-0-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/5012-3915-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB