Analysis

  • max time kernel
    166s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    11-02-2022 06:33

General

  • Target

    c17adb4d8862114d6c22dc344143e0f2645b8ae1220a994bafa86b9ada9a99d3.exe

  • Size

    53KB

  • MD5

    aa3959df901da3c685505e23791f7875

  • SHA1

    2933e04323a242c1bfbcd0bfac1124c4dd48555e

  • SHA256

    c17adb4d8862114d6c22dc344143e0f2645b8ae1220a994bafa86b9ada9a99d3

  • SHA512

    3f3876e197fdc2bdf124e3f07f295e342fc80c23523a0deacf3e8103b29bc7a5c5b45b4070f3e8ee251e09d4947ad7069f24384c049ecbffdfa49a26f4322aff

Malware Config

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 20 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c17adb4d8862114d6c22dc344143e0f2645b8ae1220a994bafa86b9ada9a99d3.exe
    "C:\Users\Admin\AppData\Local\Temp\c17adb4d8862114d6c22dc344143e0f2645b8ae1220a994bafa86b9ada9a99d3.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    PID:1156
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3448
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3944
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:372
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
    1⤵
      PID:1920
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
      1⤵
        PID:2612
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -pss -s 432 -p 372 -ip 372
        1⤵
          PID:396

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1920-135-0x00000201C8D40000-0x00000201C8D44000-memory.dmp

          Filesize

          16KB

        • memory/3448-130-0x000002817F360000-0x000002817F370000-memory.dmp

          Filesize

          64KB

        • memory/3448-131-0x000002817F920000-0x000002817F930000-memory.dmp

          Filesize

          64KB

        • memory/3448-132-0x00000281020D0000-0x00000281020D4000-memory.dmp

          Filesize

          16KB