Analysis
-
max time kernel
170s -
max time network
147s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
11-02-2022 06:39
Static task
static1
Behavioral task
behavioral1
Sample
aaead4f48553f6c12bc082fba8d16111ee87c90d8dcfe7983b53170fc3507886.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
aaead4f48553f6c12bc082fba8d16111ee87c90d8dcfe7983b53170fc3507886.exe
Resource
win10v2004-en-20220113
General
-
Target
aaead4f48553f6c12bc082fba8d16111ee87c90d8dcfe7983b53170fc3507886.exe
-
Size
51KB
-
MD5
62294093ab058b11ae6aa2a62a660ca5
-
SHA1
da4c40e4d349a1fa3a98ec144810e64a1a87f220
-
SHA256
aaead4f48553f6c12bc082fba8d16111ee87c90d8dcfe7983b53170fc3507886
-
SHA512
4f2bf7a71a7670d6e9ed8733b4a0b19551fdd44ff6469f5dad455ae23dc0848bfb67a5d381a8edf8b765178024e63b4eff1a4f53090d86cf91f09a4e48d2d68a
Malware Config
Extracted
C:\HOW_RECOVER.html
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce aaead4f48553f6c12bc082fba8d16111ee87c90d8dcfe7983b53170fc3507886.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\aaead4f48553f6c12bc082fba8d16111ee87c90d8dcfe7983b53170fc3507886.exe" aaead4f48553f6c12bc082fba8d16111ee87c90d8dcfe7983b53170fc3507886.exe