Analysis
-
max time kernel
128s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
25-02-2023 05:09
Static task
static1
Behavioral task
behavioral1
Sample
fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe
Resource
win10v2004-20230221-en
General
-
Target
fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe
-
Size
53KB
-
MD5
5efa19dc204e46e8d8c57482f80e7a40
-
SHA1
5c83b3ddc8417fe64e0bbd3495445ddcee52e35e
-
SHA256
fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f
-
SHA512
0cdf4a1263b9a341240acea245155f0afbaac864eccd1d9623a9a152a9287e8a65cd62f12804d5a1293c9d960a4958c2aa05a720f35d42699fec5d4ac0accfc1
-
SSDEEP
768:FKcvuye1kVtGBk6P/v7nWlHznbkVwrEKD9yDwxVSHrowNI2tG6o/t84B5YW:F9eytM3alnawrRIwxVSHMweio3+
Malware Config
Extracted
C:\Users\Public\Music\Sample Music\how_to_back_files.html
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\BlockImport.tiff fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File renamed C:\Users\Admin\Pictures\BlockSearch.tif => C:\Users\Admin\Pictures\BlockSearch.tif.itlock4 fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File renamed C:\Users\Admin\Pictures\MoveRepair.png => C:\Users\Admin\Pictures\MoveRepair.png.itlock4 fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Users\Admin\Pictures\SkipDisable.tiff fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File renamed C:\Users\Admin\Pictures\BlockImport.tiff => C:\Users\Admin\Pictures\BlockImport.tiff.itlock4 fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File renamed C:\Users\Admin\Pictures\ConfirmSend.raw => C:\Users\Admin\Pictures\ConfirmSend.raw.itlock4 fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File renamed C:\Users\Admin\Pictures\ConnectSave.crw => C:\Users\Admin\Pictures\ConnectSave.crw.itlock4 fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File renamed C:\Users\Admin\Pictures\SearchMount.tif => C:\Users\Admin\Pictures\SearchMount.tif.itlock4 fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File renamed C:\Users\Admin\Pictures\SkipDisable.tiff => C:\Users\Admin\Pictures\SkipDisable.tiff.itlock4 fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 540 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe" fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe -
Drops file in Program Files directory 64 IoCs
Processes:
fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00932_.WMF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\how_to_back_files.html fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02053J.JPG fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\etc\how_to_back_files.html fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\TYPE.WAV fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Sts.css fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187895.WMF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00608_.WMF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\eng.hyp fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\Vdk10.rst fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sr\LC_MESSAGES\vlc.mo fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-multiview_zh_CN.jar fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Goose_Bay fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\WidescreenPresentation.potx fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR25F.GIF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME28.CSS fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21503_.GIF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\LC_MESSAGES\vlc.mo fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Troll fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00390_.WMF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0285822.WMF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-autoupdate-cli.xml fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-loaders.xml fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsMacroTemplate.html fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\16to9Squareframe_VideoInset.png fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OLKIRM.XML fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGWEBSBR.DPV fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\BabyBoyMainToNotesBackground.wmv fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ClassicPhotoAlbum.potx fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0293240.WMF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\CG1606.WMF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00462_.WMF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\Bear_Formatted_RGB6_PAL.wmv fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mscss7wre_en.dub fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\FS3BOX.POC fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\InformationIconMask.bmp fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Niue fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\EXCEL_COL.HXT fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0106222.WMF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0301052.WMF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00100_.WMF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153089.WMF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02124_.WMF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsNotesBackground.wmv fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR15F.GIF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD21325_.GIF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PARNT_05.MID fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02437_.WMF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.garbagecollector_1.0.200.v20131115-1210.jar fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.update.configurator.nl_zh_4.4.0.v20140623020002.jar fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files\DVD Maker\Shared\DissolveAnother.png fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\equalizer_window.html fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-ui_ja.jar fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BabyBlue\TAB_ON.GIF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BORDERS\MSART6.BDR fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18216_.WMF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00200_.WMF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341455.JPG fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01575_.WMF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SY01572_.WMF fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\CENTEURO.TXT fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe File opened for modification C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exedescription pid process target process PID 1740 wrote to memory of 540 1740 fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe cmd.exe PID 1740 wrote to memory of 540 1740 fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe cmd.exe PID 1740 wrote to memory of 540 1740 fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe cmd.exe PID 1740 wrote to memory of 540 1740 fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe"C:\Users\Admin\AppData\Local\Temp\fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe"1⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\fd71b1ab3e3823ccd88c0f406c30c4386074c36e1c0432e13121550cd655098f.exe > nul2⤵
- Deletes itself
PID:540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5a2acf28b45fed0387706e25d6d53a059
SHA13804e4f71e5a0c2911702b09d67b63a37605b264
SHA25690efd08043af75a2a8a1ebcc442919420b1ab0bf16afeef2264438c6426520be
SHA512be82e8f186238b6824fb1588dd1436fddb29d492e8cf34ea0e5f1471efe043b897f44ca4165b953083dc4348b486218874d5f00f8c445838e1273e3165e70460