Analysis
-
max time kernel
4294210s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
30-03-2022 09:01
Static task
static1
Behavioral task
behavioral1
Sample
bomani2.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
bomani2.exe
Resource
win10v2004-en-20220113
General
-
Target
bomani2.exe
-
Size
56KB
-
MD5
cadf573e4ca120639a1e5484e985938d
-
SHA1
ff0d09efbb1495982073291351a81de59e2c3c0d
-
SHA256
7375b2047d519fffcbe1191522efbf73dcda6073a4fc9b77f01f009c437a2fe8
-
SHA512
a8496afe762828b23f3568c49954a7c84c2390e0b2d2bb54c141fa9af2db390fd1f0a7582a006ed2b315fd074e4a2268bfdc52a1923f1a28e706000db92015ef
Malware Config
Extracted
C:\Users\Public\Desktop\Read Me!.hTa
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Blocklisted process makes network request 6 IoCs
flow pid Process 5 1716 mshta.exe 7 1716 mshta.exe 9 1716 mshta.exe 11 1716 mshta.exe 15 1100 mshta.exe 17 1100 mshta.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce bomani2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\bomani2.exe" bomani2.exe -
Drops desktop.ini file(s) 29 IoCs
description ioc Process File opened for modification C:\Users\Public\Pictures\desktop.ini bomani2.exe File opened for modification C:\Users\Admin\Searches\desktop.ini bomani2.exe File opened for modification C:\Users\Admin\Videos\desktop.ini bomani2.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini bomani2.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini bomani2.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI bomani2.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini bomani2.exe File opened for modification C:\Users\Public\desktop.ini bomani2.exe File opened for modification C:\Users\Public\Music\desktop.ini bomani2.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini bomani2.exe File opened for modification C:\Users\Public\Downloads\desktop.ini bomani2.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini bomani2.exe File opened for modification C:\Users\Admin\Links\desktop.ini bomani2.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini bomani2.exe File opened for modification C:\Users\Admin\Documents\desktop.ini bomani2.exe File opened for modification C:\Program Files\desktop.ini bomani2.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini bomani2.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini bomani2.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini bomani2.exe File opened for modification C:\Users\Public\Libraries\desktop.ini bomani2.exe File opened for modification C:\Users\Public\Desktop\desktop.ini bomani2.exe File opened for modification C:\Program Files (x86)\desktop.ini bomani2.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini bomani2.exe File opened for modification C:\Users\Public\Documents\desktop.ini bomani2.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini bomani2.exe File opened for modification C:\Users\Public\Videos\desktop.ini bomani2.exe File opened for modification C:\Users\Admin\Music\desktop.ini bomani2.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini bomani2.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsPreviewTemplateRTL.html bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsViewAttachmentIconsMask.bmp bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\DataViewIconImagesMask.bmp bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OUTLOOK.DEV_COL.HXC bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099165.JPG bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLPH.DLL bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\StarterToolTemplates.xml bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ZoomIconsMask.bmp bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0199475.WMF bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382927.JPG bomani2.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\ICU\icudt26l.dat bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0200521.WMF bomani2.exe File opened for modification C:\Program Files\Windows Journal\Templates\blank.jtp bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OMML2MML.XSL bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\COUPON.POC bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME07.CSS bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14754_.GIF bomani2.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroSign.prc bomani2.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Read Me!.hTa bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADDINS\MSVCR71.DLL bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\WINWORD.DEV_F_COL.HXK bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\CommsOutgoingImage.jpg bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18257_.WMF bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Adjacency.xml bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN00932_.WMF bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FALL_01.MID bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Installed_schemas14.xss bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NAMECONTROLPROXY.DLL bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\subscription.xsd bomani2.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\FDFFile_8.ico bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101980.WMF bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02742G.GIF bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TR00172_.WMF bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Things\WHOOSH.WAV bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01166_.WMF bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TN00218_.WMF bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\GIFT.XML bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Elemental.xml bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00011_.GIF bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0178348.JPG bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187893.WMF bomani2.exe File opened for modification C:\Program Files\Windows Journal\it-IT\Journal.exe.mui bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\BIZFORM.DPV bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\WANS.NET.XML bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR23F.GIF bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions_Doc.css bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382952.JPG bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\XLINTL32.REST.IDX_DLL bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR17F.GIF bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00008_.WMF bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0185670.WMF bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0386764.JPG bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\FeedSync.dll bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.CO.NZ.XML bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSTORE.HXS bomani2.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\logsession.dll bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\Components\VeriSign_Class_3_Public_Primary_CA.cer bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\PublicFunctions.js bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0239611.WMF bomani2.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightYellow\Read Me!.hTa bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Swirl\header.gif bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0287415.WMF bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02829J.JPG bomani2.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\Microsoft.VisualStudio.Tools.Applications.AddInManager.dll bomani2.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\International mshta.exe Set value (int) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\International\CNum_CpCache = "1" mshta.exe Set value (data) \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\International\CpCache = e3040000 mshta.exe Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeRestorePrivilege 1532 7zG.exe Token: 35 1532 7zG.exe Token: SeSecurityPrivilege 1532 7zG.exe Token: SeSecurityPrivilege 1532 7zG.exe Token: SeRestorePrivilege 788 7zG.exe Token: 35 788 7zG.exe Token: SeSecurityPrivilege 788 7zG.exe Token: SeSecurityPrivilege 788 7zG.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1532 7zG.exe 788 7zG.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ratings mshta.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bomani2.exe"C:\Users\Admin\AppData\Local\Temp\bomani2.exe"1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
PID:1832
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Public\Desktop\Read Me!.hTa"1⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
- System policy modification
PID:1716
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" a -i#7zMap5696:76:7zEvent17021 -ad -saa -- "C:\Users\Public\Desktop\Read Me!"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1532
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\Read Me!.hTa"1⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
PID:1100
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" a -i#7zMap11114:74:7zEvent30880 -ad -saa -- "C:\Users\Admin\Desktop\Read Me!"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:788
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD554e9306f95f32e50ccd58af19753d929
SHA1eab9457321f34d4dcf7d4a0ac83edc9131bf7c57
SHA25645f94dceb18a8f738a26da09ce4558995a4fe02b971882e8116fc9b59813bb72
SHA5128711a4d866f21cdf4d4e6131ec4cfaf6821d0d22b90946be8b5a09ab868af0270a89bc326f03b858f0361a83c11a1531b894dfd1945e4812ba429a7558791f4f
-
Filesize
503B
MD57c14c6f6d1a21489e4cc01cd7d233bc7
SHA17bf55785ef4836e15fa465dc34a06cdc3a743d20
SHA256bd4903b059d4d14fbc60e9464f9e85fe326779ea35ed6882d5dbce4e37a0dc11
SHA512048189dd22f5811b9f634cbc0d117edc2aec5f5c24b9a01b724a19df9e74a2ca38bd38f5393231d40f0459f904d35e0a3d64af1f01d283970655eac0251eb819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD52999032328b7d4c430b1c633cce883f0
SHA1f776036409883153966b37290596c35ce5089ecf
SHA2567010536ec5b775a8cb9d139bb8677cb165394c3cc20ff58fe261df90f08d3ce3
SHA51260a3b2516038101d07856c27876fcbb746fe0f75bb2cb8c0deb2a645b3faad02a9a7146efc079aaa98d2ee4197632bf9702db2b3878deff3b9ada8ce25f98c3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5569a76c60ced76117d76e4ee79c2df93
SHA18209b9c6062a76d99ba80c643a3f1aaac271010d
SHA25669ffd2735320e7f59bbf677fd3d8fa5759497c673d4ec4b9bd2aa3326eaeadcd
SHA5122e25f437201d87e03d174af94a02a9db0988a7cf68a8fcd557bf6b0382a189b696319ed3ada0ce806c2b6791f0e1f9f4545c4db3b3496881ff26fae86dc48554
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DC822844F8848EAB9DF5263178C0BCFF
Filesize548B
MD56a383e390e6cef380d4e774f502d7fab
SHA1bbb5d04b0110750a0b5fbd5719dc5946eeb33ca3
SHA256179251fe9f104e3dd64fa1190fb048949dfe08f8c0d93fb1bdf80507f6c91176
SHA51288127581edf101cf91fb26a596982a3892364e9ddda1a52be787474b7241876bab854b98d4a1cb6c440dac2ec5cbd13e84f34500791e16a1b00978ae192597ca
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GC0VJYYE\b0222[1].gif
Filesize50KB
MD5926d92c5744db1500c15fcdc8f9d47a3
SHA1272ac3afbd17a804a91bca1cf0bb0bb03e9161d0
SHA25625b6d9418d32d9289178b413da675ceee1ebaa9ec2b77febac61de066ea86bff
SHA5123098fe75ddd74d6d2c37c81620fbb17d41e8f9e079b12fe4edfe71aaa8ad114658ac1f603039ba56b145dd906998ab322a6cf18a06f133b7c02a2d7b4094247d
-
Filesize
7KB
MD5ece010d48a7d7f91dec329d390fb54b4
SHA13037bc10221e93431d6a2cdc60d25480a2fc7749
SHA256f3024c61b1ba03de4eeda013ba19e4aa31473347629289003cb43e454b4ed9a6
SHA5121d68d6e8fa90494043d55ce3f3ddb08cf6b4fc918ccc1ab4349e9aa2877c68bc402ba8e621eddd257e298f1a0db29c894ef2d94e082ce4c5bcd8d8c29d946fe6
-
Filesize
7KB
MD5ece010d48a7d7f91dec329d390fb54b4
SHA13037bc10221e93431d6a2cdc60d25480a2fc7749
SHA256f3024c61b1ba03de4eeda013ba19e4aa31473347629289003cb43e454b4ed9a6
SHA5121d68d6e8fa90494043d55ce3f3ddb08cf6b4fc918ccc1ab4349e9aa2877c68bc402ba8e621eddd257e298f1a0db29c894ef2d94e082ce4c5bcd8d8c29d946fe6