Analysis

  • max time kernel
    144s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    11/02/2022, 06:25

General

  • Target

    e7f0108208e4862aea0de01ecdfbc3f1c46104e5e4609f92c77da9ecccf28b67.exe

  • Size

    54KB

  • MD5

    4451c467698b667a2fbc55ea6bd44a90

  • SHA1

    386b258431f84e0d724c7a03d108cccff5cdeb15

  • SHA256

    e7f0108208e4862aea0de01ecdfbc3f1c46104e5e4609f92c77da9ecccf28b67

  • SHA512

    ced452a646cd1a509c34904ad75c0a77e867b561b79e1d4db5ae5887be9eaf8c3c3df4d55439752d5fa183632cb493d48c819f70460f9c38e31b9f6ce3ec1f80

Malware Config

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Drops file in Windows directory 8 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7f0108208e4862aea0de01ecdfbc3f1c46104e5e4609f92c77da9ecccf28b67.exe
    "C:\Users\Admin\AppData\Local\Temp\e7f0108208e4862aea0de01ecdfbc3f1c46104e5e4609f92c77da9ecccf28b67.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1748
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /F /T /PID 1748
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2340
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3176
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2228

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3176-130-0x0000022ECFB60000-0x0000022ECFB70000-memory.dmp

    Filesize

    64KB

  • memory/3176-131-0x0000022ED0120000-0x0000022ED0130000-memory.dmp

    Filesize

    64KB

  • memory/3176-132-0x0000022ED27C0000-0x0000022ED27C4000-memory.dmp

    Filesize

    16KB