Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-06-2022 15:35
Static task
static1
Behavioral task
behavioral1
Sample
18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe
Resource
win10v2004-20220414-en
General
-
Target
18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe
-
Size
187KB
-
MD5
8f59ad7e91a0a875e8389931f8086196
-
SHA1
d644611bf6edec70568993896f6e95c6f1a577dc
-
SHA256
18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a
-
SHA512
67e459fcfa72fe71cd0387e7ee6267fbcd736d6f83461b08b6e6f284f8d1fb2cb2926bbb5879a7ff00fb468a3c05aa0fa4f09b64e9aecf1591cdefdcc4bb22ae
Malware Config
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\ImportSubmit.tiff 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File renamed C:\Users\Admin\Pictures\ImportSubmit.tiff => C:\Users\Admin\Pictures\ImportSubmit.tiff..doc 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File renamed C:\Users\Admin\Pictures\OpenApprove.png => C:\Users\Admin\Pictures\OpenApprove.png..doc 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Admin\Pictures\RegisterTrace.tiff 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File renamed C:\Users\Admin\Pictures\RegisterTrace.tiff => C:\Users\Admin\Pictures\RegisterTrace.tiff..doc 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File renamed C:\Users\Admin\Pictures\EnableResume.raw => C:\Users\Admin\Pictures\EnableResume.raw..doc 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File renamed C:\Users\Admin\Pictures\ExitDisable.tif => C:\Users\Admin\Pictures\ExitDisable.tif..doc 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe -
Loads dropped DLL 1 IoCs
pid Process 1700 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Roaming\\18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe" 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe -
Drops desktop.ini file(s) 27 IoCs
description ioc Process File opened for modification C:\Users\Public\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Public\Music\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Public\Documents\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Public\Videos\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Admin\Music\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Admin\Links\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1700 set thread context of 1344 1700 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe 28 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\OrielMergeLetter.Dotx 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Payment Type.accft 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NPSPWRAP.DLL 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\TWORIENT.DLL 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLCALL32.DLL 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\Settings.zip 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ASCIIENG.LNG 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORM.DLL 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCANPST.EXE 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Installed_resources14.xss 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.EXE 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPTIRMV.XML 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File created C:\Program Files (x86)\MSBuild\Read___ME.html 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\Explorer.zip 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\AssemblyInfo.zip 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLVBS.DLL 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\ResourceInternal.zip 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\OriginReport.Dotx 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\ResourceInternal.zip 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\CURRENCY.GIF 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MAPIPH.DLL 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLRPC.DLL 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\Text.zip 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\CodeFile.zip 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\OriginResume.Dotx 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\JFONT.DAT 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ExpenseReport.xltx 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Office Word 2003 Look.dotx 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\MDIParent.zip 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\sqlceer35EN.dll 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCDDS.DLL 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ADVCMP.DIC 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SCNPST32.DLL 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CSS7DATA000A.DLL 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\TaxonomyControl.dll 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\Read___ME.html 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\System.AddIn.dll 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\AdjacencyLetter.dotx 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Read___ME.html 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GKWord.dll 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\IPDESIGN.DLL 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.InfoPath.Client.Internal.CLRHost.dll 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mset7tkjp.dll 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\Read___ME.html 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\BloodPressureTracker.xltx 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\INTLDATE.DLL 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\WORDIRMV.XML 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\PublicAssemblies\Microsoft.VisualStudio.Tools.Applications.ComRPCChannel.dll 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\sqlcese35.dll 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\2 Top.accdt 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\SENDTO.DLL 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OEMPRINT.CAT 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PPCORE.DLL 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XLICONS.EXE 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\JUDGESCH.GIF 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\OFFISUPP.HTM 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\bdcmetadata.xsd 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.BusinessApplications.RuntimeUi.xml 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NL7MODELS000C.dll 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OIS.EXE 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OLMAPI32.DLL 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLPH.DLL 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\Dialog.zip 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1344 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1700 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1344 1700 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe 28 PID 1700 wrote to memory of 1344 1700 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe 28 PID 1700 wrote to memory of 1344 1700 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe 28 PID 1700 wrote to memory of 1344 1700 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe 28 PID 1700 wrote to memory of 1344 1700 18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe"C:\Users\Admin\AppData\Local\Temp\18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe"C:\Users\Admin\AppData\Local\Temp\18ef9d0649ea655ab0b8fea5e57ffb8a8493a0ac695863fb0290afe13d3bb01a.exe"2⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1344
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD547f7c9d2e18821b488dda2a9a6119881
SHA142b23c77e7fe5dc05f83e664a0407ac111778ec3
SHA256cb3129725d456e7c08db35168cd8f78ea5803cbcf82a031c5ebbbc59dfa030d6
SHA51264fdd3e09a9f65a05e267429a089d3f2e78141539f0afec664630648bf8c4290b48d2fb30cb8386699996dbd0e59e62ed80a83f3b137834e0caa7ec3a61b0d65
-
Filesize
11KB
MD53f176d1ee13b0d7d6bd92e1c7a0b9bae
SHA1fe582246792774c2c9dd15639ffa0aca90d6fd0b
SHA256fa4ab1d6f79fd677433a31ada7806373a789d34328da46ccb0449bbf347bd73e
SHA5120a69124819b7568d0dea4e9e85ce8fe61c7ba697c934e3a95e2dcfb9f252b1d9da7faf8774b6e8efd614885507acc94987733eba09a2f5e7098b774dfc8524b6
-
Filesize
11KB
MD53f176d1ee13b0d7d6bd92e1c7a0b9bae
SHA1fe582246792774c2c9dd15639ffa0aca90d6fd0b
SHA256fa4ab1d6f79fd677433a31ada7806373a789d34328da46ccb0449bbf347bd73e
SHA5120a69124819b7568d0dea4e9e85ce8fe61c7ba697c934e3a95e2dcfb9f252b1d9da7faf8774b6e8efd614885507acc94987733eba09a2f5e7098b774dfc8524b6