Analysis
-
max time kernel
127s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-10-2022 09:54
Static task
static1
Behavioral task
behavioral1
Sample
1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe
Resource
win10v2004-20220812-en
General
-
Target
1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe
-
Size
53KB
-
MD5
5db940cac21726852ab01ce5515c981c
-
SHA1
c547b8d21c5b7dba77ba1ec60ec8d27be67c6e75
-
SHA256
1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d
-
SHA512
bb686ca6f22de58f5804ed35417bd5117e8d52a5d953f4834d7cfcddc84f305c231291f247113918c57ede1f5b23301be4df36264d4c4065967884cb822c33d6
-
SSDEEP
768:ljvuye1kVtGBk6P/v7nWlHznbkVwrEKD9yDwxVSHrowNI2tG6o/t84B5Y6yd:l3eytM3alnawrRIwxVSHMweio3+
Malware Config
Extracted
C:\how_to_back_files.html
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\AddMerge.png => C:\Users\Admin\Pictures\AddMerge.png.mlock2 1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe File opened for modification C:\Users\Admin\Pictures\CopyConnect.tiff 1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe File renamed C:\Users\Admin\Pictures\CopyConnect.tiff => C:\Users\Admin\Pictures\CopyConnect.tiff.mlock2 1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe" 1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe