Analysis

  • max time kernel
    122s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    11/02/2022, 06:25

General

  • Target

    e7f0108208e4862aea0de01ecdfbc3f1c46104e5e4609f92c77da9ecccf28b67.exe

  • Size

    54KB

  • MD5

    4451c467698b667a2fbc55ea6bd44a90

  • SHA1

    386b258431f84e0d724c7a03d108cccff5cdeb15

  • SHA256

    e7f0108208e4862aea0de01ecdfbc3f1c46104e5e4609f92c77da9ecccf28b67

  • SHA512

    ced452a646cd1a509c34904ad75c0a77e867b561b79e1d4db5ae5887be9eaf8c3c3df4d55439752d5fa183632cb493d48c819f70460f9c38e31b9f6ce3ec1f80

Malware Config

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7f0108208e4862aea0de01ecdfbc3f1c46104e5e4609f92c77da9ecccf28b67.exe
    "C:\Users\Admin\AppData\Local\Temp\e7f0108208e4862aea0de01ecdfbc3f1c46104e5e4609f92c77da9ecccf28b67.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /F /T /PID 1040
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1924

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1040-54-0x00000000754B1000-0x00000000754B3000-memory.dmp

    Filesize

    8KB