Analysis
-
max time kernel
168s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2022 09:54
Static task
static1
Behavioral task
behavioral1
Sample
1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe
Resource
win10v2004-20220812-en
General
-
Target
1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe
-
Size
53KB
-
MD5
5db940cac21726852ab01ce5515c981c
-
SHA1
c547b8d21c5b7dba77ba1ec60ec8d27be67c6e75
-
SHA256
1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d
-
SHA512
bb686ca6f22de58f5804ed35417bd5117e8d52a5d953f4834d7cfcddc84f305c231291f247113918c57ede1f5b23301be4df36264d4c4065967884cb822c33d6
-
SSDEEP
768:ljvuye1kVtGBk6P/v7nWlHznbkVwrEKD9yDwxVSHrowNI2tG6o/t84B5Y6yd:l3eytM3alnawrRIwxVSHMweio3+
Malware Config
Extracted
C:\how_to_back_files.html
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\HideGet.tiff => C:\Users\Admin\Pictures\HideGet.tiff.mlock2 1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe File renamed C:\Users\Admin\Pictures\InvokeSearch.raw => C:\Users\Admin\Pictures\InvokeSearch.raw.mlock2 1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe File renamed C:\Users\Admin\Pictures\PushWatch.png => C:\Users\Admin\Pictures\PushWatch.png.mlock2 1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe File opened for modification C:\Users\Admin\Pictures\RequestMount.tiff 1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe File renamed C:\Users\Admin\Pictures\RequestMount.tiff => C:\Users\Admin\Pictures\RequestMount.tiff.mlock2 1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe File opened for modification C:\Users\Admin\Pictures\RestoreRemove.tiff 1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe File renamed C:\Users\Admin\Pictures\RestoreRemove.tiff => C:\Users\Admin\Pictures\RestoreRemove.tiff.mlock2 1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe File opened for modification C:\Users\Admin\Pictures\ShowBlock.tiff 1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe File opened for modification C:\Users\Admin\Pictures\HideGet.tiff 1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe File renamed C:\Users\Admin\Pictures\ShowBlock.tiff => C:\Users\Admin\Pictures\ShowBlock.tiff.mlock2 1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe" 1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 1776750df4968ba3685419918b3dd262eafabdf36cb10987752fcd15efbf257d.exe