Analysis
-
max time kernel
246s -
max time network
332s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 17:06
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220901-en
General
-
Target
file.exe
-
Size
646KB
-
MD5
fac0564b69ab03050cf82098f98317e1
-
SHA1
01d6d9b1acd7c97ddf53fe704bfdd7a587f8884f
-
SHA256
3d8b538a62473db2cd132f6eded5ba1c81c1d04702a40399a702c514247c12dc
-
SHA512
31723a2f2e90486ba567a7875a406ff548449966a9beb3b795761859f1c4a5b5950c92946d3c74d6d4410057c03d6c22d3bce1710a7099af35fd1d5eee14feb7
-
SSDEEP
12288:n/fHh2vI2amObUyGDWC7V3zuemBkCljzJVYPzzHuuf9F/Xriz5yP:n/pBmObUXDFykChJVszzH9z/7iz5yP
Malware Config
Extracted
C:\readme.txt
http://obzuqvr5424kkc4unbq2p2i67ny3zngce3tbdr37nicjqesgqcgomfqd.onion/?ST2GHJLMOPR
https://yip.su/2QstD5
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce file.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\file.exe" file.exe -
Drops desktop.ini file(s) 13 IoCs
description ioc Process File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini file.exe File opened for modification C:\Users\Public\Pictures\desktop.ini file.exe File opened for modification C:\Users\Public\Music\desktop.ini file.exe File opened for modification C:\Users\Public\Libraries\desktop.ini file.exe File opened for modification C:\Users\Public\desktop.ini file.exe File opened for modification C:\Users\Public\Videos\desktop.ini file.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini file.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini file.exe File opened for modification C:\Users\Public\Downloads\desktop.ini file.exe File opened for modification C:\Users\Public\Documents\desktop.ini file.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini file.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini file.exe File opened for modification C:\Users\Public\Desktop\desktop.ini file.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1492 set thread context of 1792 1492 file.exe 28 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1792 1492 file.exe 28 PID 1492 wrote to memory of 1792 1492 file.exe 28 PID 1492 wrote to memory of 1792 1492 file.exe 28 PID 1492 wrote to memory of 1792 1492 file.exe 28 PID 1492 wrote to memory of 1792 1492 file.exe 28 PID 1492 wrote to memory of 1792 1492 file.exe 28 PID 1492 wrote to memory of 1792 1492 file.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\file.exe"{path}"2⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
PID:1792
-