Analysis
-
max time kernel
151s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-08-2022 10:07
Static task
static1
Behavioral task
behavioral1
Sample
03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exe
Resource
win10v2004-20220812-en
General
-
Target
03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exe
-
Size
369KB
-
MD5
9913416c1e459d6aa98f851e4072aa3e
-
SHA1
17b4bb3ca5b2484d69a3bfb2b235d8e0eafebbae
-
SHA256
03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8
-
SHA512
bf1daf7445760fb36c7cd128d05920c53d5da95d52e8f68591b1b03b60ab4e1eda44346e166d18898d12d6f0a5e54ce2754f0e6781bab6f472b8dfa0b33a269c
-
SSDEEP
3072:fjzXnwdjWXxTi+VnFEeLIehTjRwfq7oKDPAa50wPU6j6/nI3nR:fjzA6xT3EeMCTjRwfqUKDPt5xe/nWnR
Malware Config
Extracted
C:\readme.txt
globeimposter
http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST4HYJUHGFV
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
vbc.exedescription ioc Process File opened for modification C:\Users\Admin\Pictures\SelectNew.tiff vbc.exe File renamed C:\Users\Admin\Pictures\SelectNew.tiff => C:\Users\Admin\Pictures\SelectNew.tiff.r2u vbc.exe File opened for modification C:\Users\Admin\Pictures\SplitEnable.tiff vbc.exe File renamed C:\Users\Admin\Pictures\SplitEnable.tiff => C:\Users\Admin\Pictures\SplitEnable.tiff.r2u vbc.exe File renamed C:\Users\Admin\Pictures\SuspendConnect.tif => C:\Users\Admin\Pictures\SuspendConnect.tif.r2u vbc.exe File renamed C:\Users\Admin\Pictures\DenyInstall.tif => C:\Users\Admin\Pictures\DenyInstall.tif.r2u vbc.exe File renamed C:\Users\Admin\Pictures\EditConfirm.crw => C:\Users\Admin\Pictures\EditConfirm.crw.r2u vbc.exe File renamed C:\Users\Admin\Pictures\FindRename.png => C:\Users\Admin\Pictures\FindRename.png.r2u vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
vbc.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2591564548-2301609547-1748242483-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2591564548-2301609547-1748242483-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\vbc.exe" vbc.exe -
Drops desktop.ini file(s) 36 IoCs
Processes:
vbc.exedescription ioc Process File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini vbc.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini vbc.exe File opened for modification C:\Users\Public\Pictures\desktop.ini vbc.exe File opened for modification C:\Users\Public\Music\desktop.ini vbc.exe File opened for modification C:\Users\Public\Documents\desktop.ini vbc.exe File opened for modification C:\Users\Admin\Links\desktop.ini vbc.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini vbc.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini vbc.exe File opened for modification C:\Users\Public\Libraries\desktop.ini vbc.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini vbc.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini vbc.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini vbc.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini vbc.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini vbc.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini vbc.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini vbc.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini vbc.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini vbc.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini vbc.exe File opened for modification C:\Users\Admin\Videos\desktop.ini vbc.exe File opened for modification C:\Users\Admin\Searches\desktop.ini vbc.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini vbc.exe File opened for modification C:\Program Files (x86)\desktop.ini vbc.exe File opened for modification C:\Users\Public\desktop.ini vbc.exe File opened for modification C:\Users\Public\Downloads\desktop.ini vbc.exe File opened for modification C:\Users\Public\Desktop\desktop.ini vbc.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini vbc.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini vbc.exe File opened for modification C:\Program Files\desktop.ini vbc.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini vbc.exe File opened for modification C:\Users\Admin\Music\desktop.ini vbc.exe File opened for modification C:\Users\Admin\Documents\desktop.ini vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI vbc.exe File opened for modification C:\Users\Public\Videos\desktop.ini vbc.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini vbc.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini vbc.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exedescription pid Process procid_target PID 1544 set thread context of 904 1544 03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exe 27 -
Drops file in Program Files directory 64 IoCs
Processes:
vbc.exedescription ioc Process File opened for modification C:\Program Files (x86)\Microsoft Sync Framework\v1.0\Runtime\x86\Microsoft.Synchronization.dll vbc.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\PPKLite.api vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0145669.JPG vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341448.JPG vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\CommsIncomingImageSmall.jpg vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SIGNL.ICO vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR34F.GIF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00828_.WMF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00913_.WMF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00555_.WMF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153313.WMF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341653.JPG vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\STS2\background.gif vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0183168.WMF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00242_.WMF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14655_.GIF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0205466.WMF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0293832.WMF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PG_INDEX.XML vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\ORG97.SAM vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSHY7FR.DLL vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\spacebackupicons.jpg vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\APPTS.ICO vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\DESKSAM.SAM vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02039U.BMP vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH01242_.WMF vbc.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Merida vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18228_.WMF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152694.WMF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGTEAR.DPV vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\RES98.POC vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Slate\TAB_OFF.GIF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD20013_.WMF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107712.WMF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\JNGLE_01.MID vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101861.BMP vbc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\vlc.mo vbc.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\is\LC_MESSAGES\vlc.mo vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\DATE.JPG vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\StaticText.jpg vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Foundry.thmx vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0086384.WMF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187835.WMF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\CollectSignatures_Sign.xsn vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00403_.WMF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.CO.JP.XML vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\XLINTL32.DLL.IDX_DLL vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0145707.JPG vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00941_.WMF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\PAWPRINT.GIF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\IPOLKINTL.DLL vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR10F.GIF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME23.CSS vbc.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\goopdateres_fr.dll vbc.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\WSS\readme.txt vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\NPAUTHZ.DLL vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QRYINT32.DLL vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02127_.WMF vbc.exe File opened for modification C:\Program Files\Windows Journal\ja-JP\jnwdui.dll.mui vbc.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Hovd vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\CERTINTL.DLL vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21448_.GIF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD14832_.GIF vbc.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02252_.WMF vbc.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
vbc.exepid Process 904 vbc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exedescription pid Process procid_target PID 1544 wrote to memory of 904 1544 03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exe 27 PID 1544 wrote to memory of 904 1544 03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exe 27 PID 1544 wrote to memory of 904 1544 03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exe 27 PID 1544 wrote to memory of 904 1544 03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exe 27 PID 1544 wrote to memory of 904 1544 03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exe 27 PID 1544 wrote to memory of 904 1544 03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exe 27 PID 1544 wrote to memory of 904 1544 03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exe"C:\Users\Admin\AppData\Local\Temp\03221c14baf01f212678ab40bce0bda4d4d1707f7978dca4fff2c1cc77da16a8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious behavior: RenamesItself
PID:904
-