Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
167s -
max time network
140s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
11/02/2022, 06:55
Static task
static1
Behavioral task
behavioral1
Sample
55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe
Resource
win10v2004-en-20220113
General
-
Target
55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe
-
Size
53KB
-
MD5
9f5d9e2b4ebb9ffe10ca665bd3007562
-
SHA1
0df95c2a55d2bda33693dd5cb5b7998aeeb28106
-
SHA256
55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6
-
SHA512
f4ea991a1ae5166a1f334bd039f393928464fae2f08423c0f2158c8619999dfc6f1d144bd919ee90df2f35ad1b0ee28289c84d7c3bcba4631d464dd0b29e68d3
Malware Config
Extracted
C:\how_to_back_files.html
<strong>[email protected].</strong></br>
http://bitmsg.me</br>
https://www.buybitcoinworldwide.com/
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\RevokeReceive.crw => C:\Users\Admin\Pictures\RevokeReceive.crw.crypt 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File renamed C:\Users\Admin\Pictures\SearchWait.crw => C:\Users\Admin\Pictures\SearchWait.crw.crypt 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File renamed C:\Users\Admin\Pictures\StepRegister.crw => C:\Users\Admin\Pictures\StepRegister.crw.crypt 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File renamed C:\Users\Admin\Pictures\SwitchPush.crw => C:\Users\Admin\Pictures\SwitchPush.crw.crypt 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File renamed C:\Users\Admin\Pictures\GetSet.png => C:\Users\Admin\Pictures\GetSet.png.crypt 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File renamed C:\Users\Admin\Pictures\PushSuspend.raw => C:\Users\Admin\Pictures\PushSuspend.raw.crypt 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Admin\Pictures\RepairUnprotect.tiff 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File renamed C:\Users\Admin\Pictures\RepairUnprotect.tiff => C:\Users\Admin\Pictures\RepairUnprotect.tiff.crypt 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe" 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe -
Drops desktop.ini file(s) 26 IoCs
description ioc Process File opened for modification C:\Users\Public\Pictures\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Public\Videos\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Admin\Music\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Public\Documents\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Public\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Admin\Links\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Public\Music\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe"C:\Users\Admin\AppData\Local\Temp\55b0a25f8e1ada853b053706965c002531cbd02dda152fbe5d218f388ada4ee6.exe"1⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
PID:1612