Analysis

  • max time kernel
    178s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    11-02-2022 06:53

General

  • Target

    59d76bbddbfa08a08162aae67c6ed8495cd43930b548135446f91bc453210b2e.exe

  • Size

    50KB

  • MD5

    0bc2df9d62ad6ae0ef7ede06857a1c99

  • SHA1

    6f7d15ee94d93f85b682b2efd4065481bf0a2eba

  • SHA256

    59d76bbddbfa08a08162aae67c6ed8495cd43930b548135446f91bc453210b2e

  • SHA512

    1d1e25ec53e7863187d8df8a0d0c152e1c3e7bc35cc4859e23f96f56bdc0c12e9ac40145b1c2dda22420cda1dc779732e898846acc9a054904f524045e05b804

Malware Config

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Modifies extensions of user files 1 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 20 IoCs
  • Drops file in Windows directory 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59d76bbddbfa08a08162aae67c6ed8495cd43930b548135446f91bc453210b2e.exe
    "C:\Users\Admin\AppData\Local\Temp\59d76bbddbfa08a08162aae67c6ed8495cd43930b548135446f91bc453210b2e.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    PID:3392
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:836
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2948

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/836-130-0x000002BC1F020000-0x000002BC1F030000-memory.dmp

    Filesize

    64KB

  • memory/836-131-0x000002BC1F080000-0x000002BC1F090000-memory.dmp

    Filesize

    64KB

  • memory/836-132-0x000002BC21750000-0x000002BC21754000-memory.dmp

    Filesize

    16KB