Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
17-02-2022 13:56
Static task
static1
Behavioral task
behavioral1
Sample
fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe
Resource
win10v2004-en-20220113
General
-
Target
fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe
-
Size
53KB
-
MD5
81fc683982ed765613c7b5162e515fc4
-
SHA1
9f51654df74aee64550cad2dedec3d956210ba17
-
SHA256
fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1
-
SHA512
d874e27c689842bf0b7074950ab5697f1c4662fc2832b5c060168988a20f0eb6d12e2dc63a272df9e09f7fb18fd116f78eb5bf8d6332db8f51d5a4013a60065c
Malware Config
Extracted
C:\how_to_back_files.html
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Modifies extensions of user files 16 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\WatchSet.tiff fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File renamed C:\Users\Admin\Pictures\JoinDeny.crw => C:\Users\Admin\Pictures\JoinDeny.crw.marlock011 fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Users\Admin\Pictures\PushRemove.tiff fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File renamed C:\Users\Admin\Pictures\StopSet.tiff => C:\Users\Admin\Pictures\StopSet.tiff.marlock011 fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Users\Admin\Pictures\UnlockCheckpoint.tiff fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File renamed C:\Users\Admin\Pictures\MeasureStep.raw => C:\Users\Admin\Pictures\MeasureStep.raw.marlock011 fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File renamed C:\Users\Admin\Pictures\ResolveExit.tiff => C:\Users\Admin\Pictures\ResolveExit.tiff.marlock011 fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File renamed C:\Users\Admin\Pictures\BackupResolve.png => C:\Users\Admin\Pictures\BackupResolve.png.marlock011 fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Users\Admin\Pictures\CompleteRestart.tiff fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File renamed C:\Users\Admin\Pictures\PushRemove.tiff => C:\Users\Admin\Pictures\PushRemove.tiff.marlock011 fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File renamed C:\Users\Admin\Pictures\UnlockCheckpoint.tiff => C:\Users\Admin\Pictures\UnlockCheckpoint.tiff.marlock011 fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File renamed C:\Users\Admin\Pictures\WatchSet.tiff => C:\Users\Admin\Pictures\WatchSet.tiff.marlock011 fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File renamed C:\Users\Admin\Pictures\CompleteRestart.tiff => C:\Users\Admin\Pictures\CompleteRestart.tiff.marlock011 fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File renamed C:\Users\Admin\Pictures\InstallConvertTo.raw => C:\Users\Admin\Pictures\InstallConvertTo.raw.marlock011 fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Users\Admin\Pictures\ResolveExit.tiff fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Users\Admin\Pictures\StopSet.tiff fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe -
Deletes itself 1 IoCs
pid Process 1460 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe" fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0158007.WMF fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\Salta fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\how_to_back_files.html fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File created C:\Program Files (x86)\Microsoft Office\Office14\BORDERS\how_to_back_files.html fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\CUP.WMF fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\EN00242_.WMF fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00489_.WMF fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH03205I.JPG fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\Rio_Gallegos fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.COM.HK.XML fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Americana\how_to_back_files.html fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File created C:\Program Files\Microsoft Games\Purble Place\ja-JP\how_to_back_files.html fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\WWINTL.DLL.IDX_DLL fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00183_.WMF fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Porto_Velho fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\feature.xml fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\4to3Squareframe_VideoInset.png fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mset7es.kic fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR29F.GIF fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0090070.WMF fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Foundry.xml fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04269_.WMF fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\art\00_musicbrainz.luac fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02045_.WMF fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\AUMProduct.cer fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\how_to_back_files.html fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File created C:\Program Files\VideoLAN\VLC\locale\el\LC_MESSAGES\how_to_back_files.html fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Sydney fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\how_to_back_files.html fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-uihandler_ja.jar fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Custom.propdesc fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0216600.WMF fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\AlertImage_FileHighMask.bmp fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099154.JPG fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prcr.x3d fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File created C:\Program Files\Java\jre7\lib\fonts\how_to_back_files.html fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL054.XML fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN001.XML fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00260_.WMF fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-profiling.jar fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-selector-api.xml fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\ALERT.ICO fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18218_.WMF fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0088542.WMF fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00333_.WMF fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01745_.GIF fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\colorcycle.png fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_rgb.wmv fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099176.WMF fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00720_.WMF fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Metro.eftx fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01772_.WMF fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01243_.GIF fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\META-INF\MANIFEST.MF fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\how_to_back_files.html fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\local_policy.jar fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\15x15dot.png fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\WSSFilesToolHomePageBackground.jpg fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107658.WMF fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files\Java\jre7\lib\jsse.jar fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SketchPadTestSchema.xml fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BRCHUR11.POC fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_CA.txt fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Minsk fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1448 wrote to memory of 1460 1448 fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe 31 PID 1448 wrote to memory of 1460 1448 fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe 31 PID 1448 wrote to memory of 1460 1448 fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe 31 PID 1448 wrote to memory of 1460 1448 fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe"C:\Users\Admin\AppData\Local\Temp\fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe"1⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\fa5ca28f848e47e8eff8c50d548d5117a3834500fc92134602cc1a672a592ff1.exe > nul2⤵
- Deletes itself
PID:1460
-