Analysis

  • max time kernel
    93s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/02/2025, 19:27

General

  • Target

    185fafbeb00cd8238fdabee088763e27012dd3a0076e04dddca6266f129f0430.exe

  • Size

    884KB

  • MD5

    034580c52732e52a382f4d550c34f09c

  • SHA1

    bd4f5d3d0ca9d9d80f001666435f5d88006e75b8

  • SHA256

    185fafbeb00cd8238fdabee088763e27012dd3a0076e04dddca6266f129f0430

  • SHA512

    300f9215a323e87d808791381bfc6e56d5fdfd8c0dcf9ceb19474e30e67557951d501da4a7a6cfdd5992450dc17bdd37144f342ab5ec9f7ec0f449e703c79074

  • SSDEEP

    12288:xroyEyv4LcKJYtcYpnOFWxLNRG2t8ruYwvs8VydFw5fawhyoUMFWcBN8gqJ:xrLv4L3YCcLNkcTMFw5fyHo

Malware Config

Extracted

Path

C:\Users\Public\Pictures\read-me.txt

Family

globeimposter

Ransom Note
All your files are Encrypted! For data recovery needs decryptor. How to buy decryptor: ---------------------------------------------------------------------------------------- | 1. Download Tor browser - https://www.torproject.org/ and install it. | 2. Open link in TOR browser - http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion/?STAHYJUHGFV | 3. Create Ticket ---------------------------------------------------------------------------------------- Note! This link is available via Tor Browser only. ------------------------------------------------------------ or http://helpqvrg3cc5mvb3.onion/ Your ID ���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
URLs

http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion/?STAHYJUHGFV

http://helpqvrg3cc5mvb3.onion/

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Globeimposter family
  • Renames multiple (8997) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops desktop.ini file(s) 30 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\185fafbeb00cd8238fdabee088763e27012dd3a0076e04dddca6266f129f0430.exe
    "C:\Users\Admin\AppData\Local\Temp\185fafbeb00cd8238fdabee088763e27012dd3a0076e04dddca6266f129f0430.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3568
    • C:\Windows\SysWOW64\finger.exe
      "C:\Windows\SysWOW64\finger.exe"
      2⤵
      • Drops desktop.ini file(s)
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:3380
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\finger.exe > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2593460650-190333679-3676257533-1000\desktop.ini

    Filesize

    1KB

    MD5

    b29d0b1f7891355f22b2afd43e1bd316

    SHA1

    b7956789cfcfdff929815bf9ef72c9e69bc306a2

    SHA256

    a5e17c895f9041f32839b0bdeaf092cf1516369f616c288c60c019e7790f30c9

    SHA512

    b166d0c696510f49efd0d8d3b48f4fff4e436aeaaaa76a49408a1e4601f242f66d49610eb8ce1de188099c17c14c58b9cb20d45a156956d3ef40d79ab9de0078

  • C:\Users\Public\Pictures\read-me.txt

    Filesize

    1KB

    MD5

    ccd330c4d3235634eded36447c016cec

    SHA1

    07df4870e694d8457b8eeb1be8770a8f2cb4cd99

    SHA256

    bba35912a159dd4bcf4ac6fb15ddf54cdc60df2238e6210d7a70c408a50b70d0

    SHA512

    63ea3ac09d892245263451c17a29bd4cc8d8d91484e8dc30860ae19f33bd84227dc07375527a90c77b5a633cbab83358105b61f46b0c8d859ca51b5440c5535e

  • memory/3380-12-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/3380-6-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/3380-8-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/3380-9-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/3568-3-0x0000000004D90000-0x0000000004E32000-memory.dmp

    Filesize

    648KB

  • memory/3568-4-0x0000000074540000-0x0000000074CF0000-memory.dmp

    Filesize

    7.7MB

  • memory/3568-5-0x0000000004D10000-0x0000000004D26000-memory.dmp

    Filesize

    88KB

  • memory/3568-0-0x000000007454E000-0x000000007454F000-memory.dmp

    Filesize

    4KB

  • memory/3568-2-0x0000000004E30000-0x0000000004ECC000-memory.dmp

    Filesize

    624KB

  • memory/3568-335-0x0000000071C55000-0x0000000071C56000-memory.dmp

    Filesize

    4KB

  • memory/3568-340-0x0000000074540000-0x0000000074CF0000-memory.dmp

    Filesize

    7.7MB

  • memory/3568-1-0x0000000000480000-0x0000000000564000-memory.dmp

    Filesize

    912KB