Analysis
-
max time kernel
166s -
max time network
137s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
11-02-2022 06:58
Static task
static1
Behavioral task
behavioral1
Sample
49aa8d1f521651cb6cc21555dbd38d320fa273dff66b9c743556fde2497deb02.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
49aa8d1f521651cb6cc21555dbd38d320fa273dff66b9c743556fde2497deb02.exe
Resource
win10v2004-en-20220112
General
-
Target
49aa8d1f521651cb6cc21555dbd38d320fa273dff66b9c743556fde2497deb02.exe
-
Size
53KB
-
MD5
2b91e153bb8d6fa628c051bfe09084e2
-
SHA1
b24ead009c7e413f8313bfde0b7137ff8fdf3e28
-
SHA256
49aa8d1f521651cb6cc21555dbd38d320fa273dff66b9c743556fde2497deb02
-
SHA512
5e6a40f4ac0ac01ca6793ce6fb9d1133e9d9662e80ec77d91b901a598c28cf6a1ccec44cd74bca356211941edce2cb77e68c996481a3a20dd499027536461392
Malware Config
Extracted
C:\how_to_back_files.html
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\DebugAssert.raw => C:\Users\Admin\Pictures\DebugAssert.raw.mlock5 49aa8d1f521651cb6cc21555dbd38d320fa273dff66b9c743556fde2497deb02.exe File opened for modification C:\Users\Admin\Pictures\DisableLock.tiff 49aa8d1f521651cb6cc21555dbd38d320fa273dff66b9c743556fde2497deb02.exe File renamed C:\Users\Admin\Pictures\DisableLock.tiff => C:\Users\Admin\Pictures\DisableLock.tiff.mlock5 49aa8d1f521651cb6cc21555dbd38d320fa273dff66b9c743556fde2497deb02.exe File renamed C:\Users\Admin\Pictures\ExitRequest.png => C:\Users\Admin\Pictures\ExitRequest.png.mlock5 49aa8d1f521651cb6cc21555dbd38d320fa273dff66b9c743556fde2497deb02.exe File opened for modification C:\Users\Admin\Pictures\SubmitDisconnect.tiff 49aa8d1f521651cb6cc21555dbd38d320fa273dff66b9c743556fde2497deb02.exe File renamed C:\Users\Admin\Pictures\SubmitDisconnect.tiff => C:\Users\Admin\Pictures\SubmitDisconnect.tiff.mlock5 49aa8d1f521651cb6cc21555dbd38d320fa273dff66b9c743556fde2497deb02.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 49aa8d1f521651cb6cc21555dbd38d320fa273dff66b9c743556fde2497deb02.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\49aa8d1f521651cb6cc21555dbd38d320fa273dff66b9c743556fde2497deb02.exe" 49aa8d1f521651cb6cc21555dbd38d320fa273dff66b9c743556fde2497deb02.exe