Phorpiex Phishing Campaign Delivers GLOBAL GROUP Ransomware
Detection stack
- AIDR
- Alert
- ETL
- Query
Summary
A high-volume phishing operation relies on malicious Windows shortcut (LNK) attachments to run a small downloader that retrieves GLOBAL GROUP ransomware. When opened, the shortcut spawns cmd.exe, which then calls PowerShell to pull a second-stage payload from an attacker-hosted IP. The ransomware saves itself as windrv.exe, encrypts data with the .Reco extension, and removes its own traces to hinder detection. GLOBAL GROUP runs fully offline, generating keys locally and never contacting external C2 for key exchange at all.
Investigation
Researchers reviewed an attachment named Document.doc.lnk that masked a weaponized shortcut. Running it launches cmd.exe and PowerShell to download spl.exe and lfuck.exe from 178.16.54.109, then saves the result as %userprofile%windrv.exe. The ransomware encrypts files, drops README.Reco.txt, creates a mutex, and erases itself while creating a scheduled task called CoolTask. Persistence is reinforced by copying to %windir%Tempcleanup.exe and registering a Windows service that re-launches the payload at system startup.
Mitigation
Email gateways should block .lnk attachments and flag double-extension filenames. On endpoints, watch cmd.exe and PowerShell chains that download executables directly from external IPs. Enable script logging and restrict PowerShell to signed scripts only. Add behavior detections for the GlobalFxo16jmdgujs437 mutex, creation of the CoolTask scheduled task, and sudden appearance of .Reco-encrypted files. Keep network blocklists current for 178.16.54.109 and update hash-based detections for spl.exe and lfuck.exe.
Response
If activity is detected, disconnect the host and stop the running ransomware processes. Delete windrv.exe and remove any related services or the CoolTask scheduled task. Recover affected data from backups only after confirming full eradication. Preserve command-line and log evidence for forensics, then update SIEM/EDR rules with the collected IOCs across the environment.
"graph TB %% Class definitions classDef action fill:#99ccff classDef malware fill:#ff6666 %% Nodes initial_access["<b>Action</b> – T1566.001 Spearphishing Attachment<br/><b>Description</b>: Sends malicious email attachments to gain initial access."] class initial_access action lnk_smuggling["<b>Action</b> – T1027.012 LNK Icon Smuggling<br/><b>Description</b>: Uses a LNK shortcut with a deceptive icon to trick users into executing malicious payload."] class lnk_smuggling action cmd_shell["<b>Action</b> – T1059.003 Windows Command Shell<br/><b>Description</b>: Executes commands via cmd.exe to interact with the system."] class cmd_shell action powershell["<b>Action</b> – T1059.001 PowerShell<br/><b>Description</b>: Downloads additional payload using PowerShell scripts."] class powershell action ransomware["<b>Malware</b> – GLOBAL GROUP ransomware<br/><b>Description</b>: Encrypts files on victim systems for ransom."] class ransomware malware scheduled_task["<b>Action</b> – T1053 Scheduled Task/Job<br/><b>Description</b>: Creates a scheduled task to maintain persistence."] class scheduled_task action sandbox_evasion["<b>Action</b> – T1497.002 Virtualization/Sandbox Evasion<br/><b>Description</b>: Performs user activity checks to avoid sandbox detection."] class sandbox_evasion action input_capture["<b>Action</b> – T1056 Input Capture<br/><b>Description</b>: Captures credentials via input monitoring for impersonation."] class input_capture action remote_service["<b>Action</b> – T1210 Exploitation of Remote Services<br/><b>Description</b>: Creates services on remote hosts to spread laterally."] class remote_service action file_deletion["<b>Action</b> – T1070.004 File Deletion<br/><b>Description</b>: Deletes malicious binaries after execution to cover tracks."] class file_deletion action %% Connections initial_access –>|delivers| lnk_smuggling lnk_smuggling –>|executes| cmd_shell cmd_shell –>|triggers| powershell powershell –>|executes| ransomware ransomware –>|establishes| scheduled_task ransomware –>|evades| sandbox_evasion ransomware –>|captures| input_capture ransomware –>|spreads via| remote_service ransomware –>|cleans up| file_deletion "
Attack Flow
Detections
Download or Upload via Powershell (via cmdline)
View
Suspicious File Download Direct IP (via proxy)
View
Schtasks Points to Suspicious Directory / Binary / Script (via cmdline)
View
Suspicious VSSADMIN Activity (via cmdline)
View
IOCs (DestinationIP) to detect: Phorpiex Phishing Campaign Delivers GLOBAL GROUP Ransomware
View
IOCs (SourceIP) to detect: Phorpiex Phishing Campaign Delivers GLOBAL GROUP Ransomware
View
IOCs (HashSha256) to detect: Phorpiex Phishing Campaign Delivers GLOBAL GROUP Ransomware
View
Detection of Phorpiex Phishing Campaign with GLOBAL GROUP Ransomware [Windows File Event]
View
Detect GLOBAL GROUP Ransomware Execution via Command Line [Windows Process Creation]
View
Phorpiex Campaign PowerShell Payload Retrieval [Windows Network Connection]
View
Simulation Execution
Prerequisite: The Telemetry & Baseline Pre‑flight Check must have passed.
Rationale: This section details the precise execution of the adversary technique (TTP) designed to trigger the detection rule. The commands and narrative MUST directly reflect the TTPs identified and aim to generate the exact telemetry expected by the detection logic.
Attack Narrative & Commands
- Preparation: The attacker has obtained the ransomware payload (
gg.exe) and stores it inC:Tempgg.exe. - Execution Wrapper: Using a batch‑style command line, the attacker launches
cmd.exe, which in turn spawns a PowerShell instance that callsStart-Processto run the payload. - Timing Delay: To mimic the ransomware’s “sleep” behavior, the same command line appends a
ping -n 3 127.0.0.1call (approximately a 2‑second delay). - Result: A single process creation event is emitted with a command line containing cmd.exe, powershell.exe, Start-Process, and
ping -n 3. This matches the Sigma rule’s three required substrings.
Regression Test Script
# -------------------------------------------------
# Global Group Ransomware Execution Simulation
# -------------------------------------------------
# Prerequisite: Ensure C:Tempgg.exe exists (dummy file for test)
if (-not (Test-Path "C:Tempgg.exe")) {
New-Item -Path "C:Tempgg.exe" -ItemType File -Force | Out-Null
}
# Craft the combined command line
$combinedCmd = 'cmd.exe /c "powershell.exe -Command `"Start-Process -FilePath C:Tempgg.exe`" & ping -n 3 127.0.0.1"'
# Execute the command (this will generate a single 4688 event)
Invoke-Expression $combinedCmd
# Optional: Write a marker to the console for test tracking
Write-Host "[+] Global Group Ransomware simulation executed."
Cleanup Commands
# Remove the dummy ransomware file
Remove-Item -Path "C:Tempgg.exe" -Force
# (Optional) Clear any lingering PowerShell jobs – not needed for this simple test
Write-Host "[+] Cleanup completed."
End of Report