Analysis
-
max time kernel
164s -
max time network
147s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
11-02-2022 06:51
Static task
static1
Behavioral task
behavioral1
Sample
622d171ff8e947e6a57fff1eb063e40c5b40338dd039e7ce71e613774b4c3cac.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
622d171ff8e947e6a57fff1eb063e40c5b40338dd039e7ce71e613774b4c3cac.exe
Resource
win10v2004-en-20220112
General
-
Target
622d171ff8e947e6a57fff1eb063e40c5b40338dd039e7ce71e613774b4c3cac.exe
-
Size
53KB
-
MD5
8cabf7aad09357ff658e078c01d41dd2
-
SHA1
2377520778ced3e5318cb2dda637ec6f8397a08e
-
SHA256
622d171ff8e947e6a57fff1eb063e40c5b40338dd039e7ce71e613774b4c3cac
-
SHA512
4e8559a352e49f87fa8a80b910785ed06ea5fd59c70e35fa403eeafde314ffc96b515912825d2092572c6f49a3a36db006d747bc62d52df94cf4e40f3417406e
Malware Config
Extracted
C:\how_to_back_files.html
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\ResumeDisable.png => C:\Users\Admin\Pictures\ResumeDisable.png.ZEUS 622d171ff8e947e6a57fff1eb063e40c5b40338dd039e7ce71e613774b4c3cac.exe File renamed C:\Users\Admin\Pictures\SaveSplit.png => C:\Users\Admin\Pictures\SaveSplit.png.ZEUS 622d171ff8e947e6a57fff1eb063e40c5b40338dd039e7ce71e613774b4c3cac.exe File renamed C:\Users\Admin\Pictures\SkipDeny.crw => C:\Users\Admin\Pictures\SkipDeny.crw.ZEUS 622d171ff8e947e6a57fff1eb063e40c5b40338dd039e7ce71e613774b4c3cac.exe File renamed C:\Users\Admin\Pictures\ResumeApprove.png => C:\Users\Admin\Pictures\ResumeApprove.png.ZEUS 622d171ff8e947e6a57fff1eb063e40c5b40338dd039e7ce71e613774b4c3cac.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 622d171ff8e947e6a57fff1eb063e40c5b40338dd039e7ce71e613774b4c3cac.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\622d171ff8e947e6a57fff1eb063e40c5b40338dd039e7ce71e613774b4c3cac.exe" 622d171ff8e947e6a57fff1eb063e40c5b40338dd039e7ce71e613774b4c3cac.exe