Analysis
-
max time kernel
158s -
max time network
135s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
11-02-2022 07:00
Static task
static1
Behavioral task
behavioral1
Sample
4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe
Resource
win10v2004-en-20220112
General
-
Target
4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe
-
Size
53KB
-
MD5
e4fd7157b23ed237cff07f1ab35636d8
-
SHA1
f6e8188ada1b5d0bbbe986091d12d8e7fb5d4f67
-
SHA256
4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da
-
SHA512
6493bb7bbd80a31675ec4a0bdf954c081b3ffe38f4fc16efb8aeac29d5aabdb87bf4012ac60a0d30742f63096513d74f7e86b299bc852cd5553d5ed1ade0ba6e
Malware Config
Extracted
C:\how_to_back_files.html
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\MountDisable.crw => C:\Users\Admin\Pictures\MountDisable.crw.marlock04 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File renamed C:\Users\Admin\Pictures\RepairTest.crw => C:\Users\Admin\Pictures\RepairTest.crw.marlock04 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Users\Admin\Pictures\SubmitLimit.tiff 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File renamed C:\Users\Admin\Pictures\SubmitLimit.tiff => C:\Users\Admin\Pictures\SubmitLimit.tiff.marlock04 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File renamed C:\Users\Admin\Pictures\SuspendSkip.tif => C:\Users\Admin\Pictures\SuspendSkip.tif.marlock04 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File renamed C:\Users\Admin\Pictures\UnlockSubmit.png => C:\Users\Admin\Pictures\UnlockSubmit.png.marlock04 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File renamed C:\Users\Admin\Pictures\HideConvert.tif => C:\Users\Admin\Pictures\HideConvert.tif.marlock04 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File renamed C:\Users\Admin\Pictures\InstallRequest.png => C:\Users\Admin\Pictures\InstallRequest.png.marlock04 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe" 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSOUTL.OLB 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\AWARDHM.POC 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\LABELHM.POC 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\POSTCD98.POC 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSHY7EN.LEX 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\how_to_back_files.html 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\OriginMergeFax.Dotx 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CATALOG.XML 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\SNIPE.POC 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\List.accdt 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BROCHURE.XML 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CERT98.POC 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\RES98.POC 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BIZCARD.DPV 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CERT.XML 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\ENV98.POC 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\resources\1033\Synchronization.rll 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Payment Type.accft 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Address.accft 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Phone.accft 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\EquityReport.Dotx 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.BusinessData.xml 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.BusinessData.xml 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGDOTS.DPV 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DOTS.POC 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\Dataset.zip 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\Module.zip 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\ENVELOPE.XML 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\FORM98.POC 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\OFFISUPP.GIF 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\SEAMARBL.HTM 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\2 Right.accdt 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\JFONT.DAT 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mscss7cm_es.dub 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mset7es.kic 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGMARQ.XML 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGWEBCAL.XML 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\TextFile.zip 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\EquityResume.Dotx 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\POSTCARD.DPV 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB5A.BDR 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\INVITE.DPV 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\LABEL98.POC 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\QUERIES\MSN MoneyCentral Investor Currency Rates.iqy 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGWEBCAL.DPV 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGWEBPQT.XML 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\AppConfigInternal.zip 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\TimeCard.xltx 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\EquityFax.Dotx 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\NAVBRPH2.POC 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\PROG98.POC 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\WORDREP.XML 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Blog.dotx 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\UrbanReport.Dotx 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\EssentialMergeLetter.dotx 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ASCIIENG.LNG 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mscss7wre_es.dub 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\Settings.zip 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\EssentialResume.dotx 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGLOGO.XML 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\NAVBRPH1.POC 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\AdjacencyLetter.dotx 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CALNDR98.POC 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Name.accft 4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe"C:\Users\Admin\AppData\Local\Temp\4343749c8d6b79e9d25c0a9b53de331edb340472dcc949680a9d1a1fc7de88da.exe"1⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops file in Program Files directory
PID:1912