Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24/01/2025, 03:25

General

  • Target

    2025-01-24_1501a928d3559da3a5605425242b1fe3_globeimposter.exe

  • Size

    55KB

  • MD5

    1501a928d3559da3a5605425242b1fe3

  • SHA1

    f19ea38c2bffcc1d8e79936db6ca8c674e9abfa8

  • SHA256

    a5cbe78cc610852573a81dc3f028af6ceb22e0d425f9f1ada37fbba8a1bf9ecf

  • SHA512

    301a1a80e8278898c47095630605e4e752d148ab556601b08eaba686d471556f83936a306f82ed64c8c5a403d1f807f6cab1890719e939420f3e4186fc275092

  • SSDEEP

    1536:4kjkfV+KJolntwrbDSTWvTwhQMhmpdLte48:4k4fIKJolntGDT5qm3LEn

Malware Config

Extracted

Path

C:\Users\Public\Videos\HOW_TO_BACK_FILES.html

Ransom Note
<html> <style type="text/css"> body { background-color: #404040; } { margin: 0; padding: 0; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ width: 800px; display: block; margin: auto; position: relative; } .tabs1 .head{ text-align: center; float: top; text-transform: uppercase; font-weight: normal; display: block; padding: 15px; color: #000000; background: #4A83FD; } .tabs1 .identi { margin-left: 15px; line-height: 13px; font-size: 13px; text-align: center; float: top; display: block; padding: 15px; background: #303030; color: #DFDFDF; } /*---*/ .tabs{ width: 800px; display: block; margin: auto; position: relative; } .tabs .tab{ float: left; display: block; } .tabs .tab>input[type="radio"] { position: absolute; top: -9999px; left: -9999px; } .tabs .tab>label { display: block; padding: 6px 21px; font-size: 18x; text-transform: uppercase; cursor: pointer; position: relative; color: #FFF; background: #4A83FD; } .tabs .content { z-index: 0;/* or display: none; */ overflow: hidden; width: 800px; /*padding: 25px;*/ position: absolute; top: 32px; left: 0; background: #303030; color: #DFDFDF; opacity:0; transition: opacity 400ms ease-out; } .tabs .content .text{ width: 700px; padding: 25px; } .tabs>.tab>[id^="tab"]:checked + label { top: 0; background: #303030; color: #F5F5F5; } .tabs>.tab>[id^="tab"]:checked ~ [id^="tab-content"] { z-index: 1;/* or display: block; */ opacity: 1; transition: opacity 400ms ease-out; } </style> <head> <meta charset="utf-8"> <title>HOW TO DECRYPT YOUR FILES</title> </head> <body> <div class="tabs1"> <div class="head" ><h3>Your personal ID</h3></div> <div class="identi"> <pre>���������������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pre><!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <input type="radio" name="tabs" checked="checked" id="tab1" /> <label for="tab1">English</label> <div id="tab-content1" class="content"> <h1>&#9760; Your files are encrypted! &#9760;</h1> <hr/> <h3>All your important data has been encrypted.</h3> <br/> <div class="text"> <!--text data --> <h3>To recover data you need decryptor.</br> To get the decryptor you should:</br> 1. Copy your personal ID. You can find it at the beginning of this page<br> 2. Contact support by email [email protected] or [email protected] and send your personal ID.</h3> In the first letter to us you can attach one encrypted file for free decrypt. We can decrypt one file in quality the evidence that we have the decoder.</br> <center>Attention!</center></br> <ul> <li>If files locked on multiple PC's of your company we will provide universal decryptor for all computers in your network. Please let us know if files encrypted on multiple PCs</li> <li>Attempts to self-decrypting files will result in the loss of your data</li> <li>Decoders other users are not compatible with your data, because each user's unique encryption key</li> </ul> <!--text data --> </div> </div> </div> <!--tab--> </ul> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html> �����������

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Globeimposter family
  • Renames multiple (7547) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 37 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-24_1501a928d3559da3a5605425242b1fe3_globeimposter.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-24_1501a928d3559da3a5605425242b1fe3_globeimposter.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:2476

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Videos\HOW_TO_BACK_FILES.html

    Filesize

    4KB

    MD5

    e59242455c73ddde49a713a281e428ac

    SHA1

    7429af39b5bcde075dd6fafb34a82f253388c13b

    SHA256

    ee4a36a09d61189e9801b02cfd40c2926a1ae537ae5644a644b3e50dd9336782

    SHA512

    704899c8e13153fae634e727623550876773bccbd11382edfe7f847bdcc72281d3b1cb4b343fbbffaea6e4421052b8db5cf855a947e42e3a6339f53fbe96f2b9

  • memory/2476-0-0x0000000000400000-0x000000000040EA00-memory.dmp

    Filesize

    58KB

  • memory/2476-686-0x0000000000400000-0x000000000040EA00-memory.dmp

    Filesize

    58KB