Analysis
-
max time kernel
156s -
max time network
134s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
11-02-2022 06:23
Static task
static1
Behavioral task
behavioral1
Sample
f973d9e1e4be678056cc402a8e72e474fcfca0799938fc89e0f6cdcf9203c0a2.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f973d9e1e4be678056cc402a8e72e474fcfca0799938fc89e0f6cdcf9203c0a2.exe
Resource
win10v2004-en-20220112
General
-
Target
f973d9e1e4be678056cc402a8e72e474fcfca0799938fc89e0f6cdcf9203c0a2.exe
-
Size
53KB
-
MD5
d0422977806bae4cfe7d440920a0b00c
-
SHA1
3c92b7949783dd84ff86319b7780506cfc4e2853
-
SHA256
f973d9e1e4be678056cc402a8e72e474fcfca0799938fc89e0f6cdcf9203c0a2
-
SHA512
7bb49a62890d82006ab8fb99019aed1da6c611c52ec8f2aa885fdff67352ce47c9b2c748592e3673882a7733fe396f202d13a46e006fa3d32ccdbd27920119ad
Malware Config
Extracted
C:\how_to_back_files.html
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\WaitRequest.png => C:\Users\Admin\Pictures\WaitRequest.png.farrattack f973d9e1e4be678056cc402a8e72e474fcfca0799938fc89e0f6cdcf9203c0a2.exe File renamed C:\Users\Admin\Pictures\CompareStop.raw => C:\Users\Admin\Pictures\CompareStop.raw.farrattack f973d9e1e4be678056cc402a8e72e474fcfca0799938fc89e0f6cdcf9203c0a2.exe File renamed C:\Users\Admin\Pictures\ConnectShow.png => C:\Users\Admin\Pictures\ConnectShow.png.farrattack f973d9e1e4be678056cc402a8e72e474fcfca0799938fc89e0f6cdcf9203c0a2.exe File renamed C:\Users\Admin\Pictures\DebugUninstall.tif => C:\Users\Admin\Pictures\DebugUninstall.tif.farrattack f973d9e1e4be678056cc402a8e72e474fcfca0799938fc89e0f6cdcf9203c0a2.exe File renamed C:\Users\Admin\Pictures\PushPublish.raw => C:\Users\Admin\Pictures\PushPublish.raw.farrattack f973d9e1e4be678056cc402a8e72e474fcfca0799938fc89e0f6cdcf9203c0a2.exe File opened for modification C:\Users\Admin\Pictures\ReceiveRequest.tiff f973d9e1e4be678056cc402a8e72e474fcfca0799938fc89e0f6cdcf9203c0a2.exe File renamed C:\Users\Admin\Pictures\ReceiveRequest.tiff => C:\Users\Admin\Pictures\ReceiveRequest.tiff.farrattack f973d9e1e4be678056cc402a8e72e474fcfca0799938fc89e0f6cdcf9203c0a2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce f973d9e1e4be678056cc402a8e72e474fcfca0799938fc89e0f6cdcf9203c0a2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\f973d9e1e4be678056cc402a8e72e474fcfca0799938fc89e0f6cdcf9203c0a2.exe" f973d9e1e4be678056cc402a8e72e474fcfca0799938fc89e0f6cdcf9203c0a2.exe