Analysis
-
max time kernel
151s -
max time network
118s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
06-01-2022 12:02
Static task
static1
Behavioral task
behavioral1
Sample
2f121145ea11b36f9ade0cb8f319e40a.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2f121145ea11b36f9ade0cb8f319e40a.exe
Resource
win10-en-20211208
General
-
Target
2f121145ea11b36f9ade0cb8f319e40a.exe
-
Size
360KB
-
MD5
2f121145ea11b36f9ade0cb8f319e40a
-
SHA1
d68049989ce98f71f6a562e439f6b6f0a165f003
-
SHA256
59e0ab333060b4e510db5d36d87f0fe267ab66b0881955649b06d91d6dd2d486
-
SHA512
9211a74cfa23c70c6ace8bd168ecbe1bb4a06d2e03b5adff5546115137b6ce849d3e41337581123d48e5082319f507d8f2d274621317fada182530e4a0abb6c7
Malware Config
Extracted
C:\read-me.txt
globeimposter
http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion/?STAHYJUHGFV
http://helpqvrg3cc5mvb3.onion/
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\ResumeReceive.tiff 2f121145ea11b36f9ade0cb8f319e40a.exe File renamed C:\Users\Admin\Pictures\ResumeReceive.tiff => C:\Users\Admin\Pictures\ResumeReceive.tiff.xls 2f121145ea11b36f9ade0cb8f319e40a.exe File renamed C:\Users\Admin\Pictures\SplitConvertTo.tif => C:\Users\Admin\Pictures\SplitConvertTo.tif.xls 2f121145ea11b36f9ade0cb8f319e40a.exe File renamed C:\Users\Admin\Pictures\UnblockWatch.tif => C:\Users\Admin\Pictures\UnblockWatch.tif.xls 2f121145ea11b36f9ade0cb8f319e40a.exe File renamed C:\Users\Admin\Pictures\GroupDisconnect.crw => C:\Users\Admin\Pictures\GroupDisconnect.crw.xls 2f121145ea11b36f9ade0cb8f319e40a.exe File renamed C:\Users\Admin\Pictures\HideSplit.crw => C:\Users\Admin\Pictures\HideSplit.crw.xls 2f121145ea11b36f9ade0cb8f319e40a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\2f121145ea11b36f9ade0cb8f319e40a.exe" 2f121145ea11b36f9ade0cb8f319e40a.exe Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 2f121145ea11b36f9ade0cb8f319e40a.exe -
Drops desktop.ini file(s) 29 IoCs
description ioc Process File opened for modification C:\Users\Public\Desktop\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Admin\Music\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Public\Videos\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Admin\Links\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Public\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Public\Documents\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Public\Music\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 2f121145ea11b36f9ade0cb8f319e40a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 792 set thread context of 1760 792 2f121145ea11b36f9ade0cb8f319e40a.exe 29 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGWEBHD.DPV 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR19F.GIF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21297_.GIF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\WidescreenPresentation.potx 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\LTHD98SP.POC 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\goopdateres_ms.dll 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0090777.WMF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WNTER_01.MID 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\1 Top.accdt 2f121145ea11b36f9ade0cb8f319e40a.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\read-me.txt 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21480_.GIF 2f121145ea11b36f9ade0cb8f319e40a.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\read-me.txt 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0221903.WMF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Adjacency.xml 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00833_.WMF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SENDTO.DLL 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGCINFO.XML 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\EMAIL.XML 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Adobe.css 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\libwgl_plugin.dll 2f121145ea11b36f9ade0cb8f319e40a.exe File created C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\read-me.txt 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\CUP.WMF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152602.WMF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE03459_.WMF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\goopdateres_bn.dll 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLPH.DLL 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGLOGO.DPV 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.COM.BR.XML 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0195812.WMF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0188667.WMF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE02369_.WMF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\SY______.PFM 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\Microsoft.Office.Infopath.dll 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsViewAttachmentIcons.jpg 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GRAPH_K_COL.HXK 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185798.WMF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libvhs_plugin.dll 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SLERROR.XML 2f121145ea11b36f9ade0cb8f319e40a.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Welcome Tool\read-me.txt 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00532_.WMF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\goopdateres_lv.dll 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Sales Pipeline.accdt 2f121145ea11b36f9ade0cb8f319e40a.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\read-me.txt 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\Dynamic.pdf 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107494.WMF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE03339_.WMF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE03466_.WMF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Cartridges\Informix.xsl 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\VSTA\Bin\1033\VSTAProjectUI.dll 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL090.XML 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN01545_.WMF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD00234_.WMF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libtransform_plugin.dll 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS01634_.WMF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0304371.WMF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02567J.JPG 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGWEBAD.XML 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.COM.HK.XML 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME24.CSS 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00174_.GIF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\GrayCheck\TAB_ON.GIF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21301_.GIF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0157191.WMF 2f121145ea11b36f9ade0cb8f319e40a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0294991.WMF 2f121145ea11b36f9ade0cb8f319e40a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 852 schtasks.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 792 wrote to memory of 852 792 2f121145ea11b36f9ade0cb8f319e40a.exe 27 PID 792 wrote to memory of 852 792 2f121145ea11b36f9ade0cb8f319e40a.exe 27 PID 792 wrote to memory of 852 792 2f121145ea11b36f9ade0cb8f319e40a.exe 27 PID 792 wrote to memory of 852 792 2f121145ea11b36f9ade0cb8f319e40a.exe 27 PID 792 wrote to memory of 1760 792 2f121145ea11b36f9ade0cb8f319e40a.exe 29 PID 792 wrote to memory of 1760 792 2f121145ea11b36f9ade0cb8f319e40a.exe 29 PID 792 wrote to memory of 1760 792 2f121145ea11b36f9ade0cb8f319e40a.exe 29 PID 792 wrote to memory of 1760 792 2f121145ea11b36f9ade0cb8f319e40a.exe 29 PID 792 wrote to memory of 1760 792 2f121145ea11b36f9ade0cb8f319e40a.exe 29 PID 792 wrote to memory of 1760 792 2f121145ea11b36f9ade0cb8f319e40a.exe 29 PID 792 wrote to memory of 1760 792 2f121145ea11b36f9ade0cb8f319e40a.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f121145ea11b36f9ade0cb8f319e40a.exe"C:\Users\Admin\AppData\Local\Temp\2f121145ea11b36f9ade0cb8f319e40a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jVYbanglCI" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3006.tmp"2⤵
- Creates scheduled task(s)
PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\2f121145ea11b36f9ade0cb8f319e40a.exe"{path}"2⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
PID:1760
-