Analysis
-
max time kernel
162s -
max time network
136s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
11-02-2022 07:11
Static task
static1
Behavioral task
behavioral1
Sample
14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe
Resource
win10v2004-en-20220113
General
-
Target
14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe
-
Size
56KB
-
MD5
6e11699bc2a423b584b4ec90031336dc
-
SHA1
20a1e0ee0cc37b8d62e5c086ac1840d428c32049
-
SHA256
14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c
-
SHA512
af85335968fb72ef69d2dd92cda18edd84e29d226be9993d034cb44fa5ef2c941fc37dad4a001d5e23736d006f337a0be289f8d38f6f539ab53442a629cb5abf
Malware Config
Extracted
C:\how_to_back_files.html
1F9WMAsdYPDaQuxx2F3t6vcJQw9KswFjsv
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\ResolveConvertFrom.tiff 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe File renamed C:\Users\Admin\Pictures\ResolveConvertFrom.tiff => C:\Users\Admin\Pictures\ResolveConvertFrom.tiff.waiting4keys 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe File renamed C:\Users\Admin\Pictures\SelectAdd.png => C:\Users\Admin\Pictures\SelectAdd.png.waiting4keys 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe File renamed C:\Users\Admin\Pictures\UnlockPop.png => C:\Users\Admin\Pictures\UnlockPop.png.waiting4keys 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe File renamed C:\Users\Admin\Pictures\WriteConvertFrom.raw => C:\Users\Admin\Pictures\WriteConvertFrom.raw.waiting4keys 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe File renamed C:\Users\Admin\Pictures\InvokeClear.crw => C:\Users\Admin\Pictures\InvokeClear.crw.waiting4keys 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe" 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe -
Drops desktop.ini file(s) 18 IoCs
description ioc Process File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe File opened for modification C:\Users\Public\desktop.ini 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe File opened for modification C:\Users\Admin\Music\desktop.ini 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe File opened for modification C:\Users\Public\Music\desktop.ini 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe File opened for modification C:\Users\Public\Documents\desktop.ini 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe File opened for modification C:\Users\Public\Videos\desktop.ini 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe"C:\Users\Admin\AppData\Local\Temp\14dcf6c34fd449588658cd22fd5e902192e56c4c1f3d6e8dea7dfdff93bf881c.exe"1⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
PID:752