Analysis

  • max time kernel
    163s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    11-02-2022 06:50

General

  • Target

    680b68bf2f022aea080cc2a864e591538daa5bab2022f373db567ab436263ac2.exe

  • Size

    53KB

  • MD5

    0774b1ee36f43ed2350e2bdd4bdb3f36

  • SHA1

    148a2b59389a9bf6a2c3e3cb6de841529a52efa3

  • SHA256

    680b68bf2f022aea080cc2a864e591538daa5bab2022f373db567ab436263ac2

  • SHA512

    dfaec3926c6ab545832a59dd64e997f20fc32dca133187bcea1cede8fa6772c040a670b1ee694baae5cdf3747b4e4ce4512a76f1ae867aac977f1e32d0a40afa

Malware Config

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Locky

    Ransomware strain released in 2016, with advanced features like anti-analysis.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\680b68bf2f022aea080cc2a864e591538daa5bab2022f373db567ab436263ac2.exe
    "C:\Users\Admin\AppData\Local\Temp\680b68bf2f022aea080cc2a864e591538daa5bab2022f373db567ab436263ac2.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    PID:308

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/308-54-0x0000000076491000-0x0000000076493000-memory.dmp

    Filesize

    8KB