Resubmissions

06-03-2023 04:51

230306-fg2wrsac3t 8

25-02-2023 05:08

230225-fsjvbscc39 10

Analysis

  • max time kernel
    132s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    25-02-2023 05:08

General

  • Target

    1532bba40b917d274d0b3dc2b27c5feacae985ba425f3cffcb5e963e20af5bcb.exe

  • Size

    53KB

  • MD5

    4a6a6b20f1cf998265b089feb5012ac7

  • SHA1

    aa88da5ce9890bdf997f221a298ca18647f26288

  • SHA256

    1532bba40b917d274d0b3dc2b27c5feacae985ba425f3cffcb5e963e20af5bcb

  • SHA512

    2a103455f0665bf1a52b18c9cd2a7d21ec16e92bf061a7f4890f970705fcaddd6770fc86d88b84e855cdae4f196eb589f05a43d0ac809d00e8cd99b6daa08883

  • SSDEEP

    768:83vuye1kVtGBk6P/v7nWlHznbkVwrEKD9yDwxVSHrowNI2tG6o/t84B5YvgO6:8TeytM3alnawrRIwxVSHMweio3+4O

Malware Config

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Modifies extensions of user files 8 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1532bba40b917d274d0b3dc2b27c5feacae985ba425f3cffcb5e963e20af5bcb.exe
    "C:\Users\Admin\AppData\Local\Temp\1532bba40b917d274d0b3dc2b27c5feacae985ba425f3cffcb5e963e20af5bcb.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\1532bba40b917d274d0b3dc2b27c5feacae985ba425f3cffcb5e963e20af5bcb.exe > nul
      2⤵
      • Deletes itself
      PID:852

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Music\Sample Music\how_to_back_files.html

    Filesize

    4KB

    MD5

    55fef323ee2f9ab32a2752955e2e4425

    SHA1

    a042c395612e98789f9499a3f5d84c5cff85866e

    SHA256

    5cb5ff799c0e186a99720c76f8f7d087808d7fc61fbd1708142cd3fa2029b842

    SHA512

    1ff97eae490e9a4a8f3625570bcd586b06a69a6730840f90f34521434dbf6de568647d5544f0ba0de54b338d99f6aa2c68c59124a0ff5fca35a66cb4da1a7c48

  • memory/1392-92-0x0000000000400000-0x000000000040E200-memory.dmp

    Filesize

    56KB