Analysis

  • max time kernel
    49s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2024 15:12

General

  • Target

    48493bb68bc1062b11cc505e444db288ec6cba0c979d10a9b5a3ea775daf9420.exe

  • Size

    53KB

  • MD5

    13bfc9705ee633aec38f4ccffdca471c

  • SHA1

    bfa8395e872262b95bb218b9834edd90ab2cff5e

  • SHA256

    48493bb68bc1062b11cc505e444db288ec6cba0c979d10a9b5a3ea775daf9420

  • SHA512

    c900e5dd21c35c2ff875b3d209bff0da0d52468d48dc17324401f5646bf7bdcbeec460085e8abad222dfb30bd85e2c3d214dce80e2de567cb6ddee217999be6e

  • SSDEEP

    768:1xPUSvuye1kVtGBk6P/v7nWlHznbkVwrEKD9yDwxVSHrowNI2tG6o/t84B5NID:1lHeytM3alnawrRIwxVSHMweio3jI

Malware Config

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Renames multiple (8113) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 37 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48493bb68bc1062b11cc505e444db288ec6cba0c979d10a9b5a3ea775daf9420.exe
    "C:\Users\Admin\AppData\Local\Temp\48493bb68bc1062b11cc505e444db288ec6cba0c979d10a9b5a3ea775daf9420.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:1708
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\48493bb68bc1062b11cc505e444db288ec6cba0c979d10a9b5a3ea775daf9420.exe > nul
      2⤵
        PID:2524

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Unsecured Credentials

    1
    T1552

    Credentials In Files

    1
    T1552.001

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-3601492379-692465709-652514833-1000\desktop.ini
      Filesize

      1KB

      MD5

      459a3775f453b856c28dae64b237268f

      SHA1

      a574d1067b776d68ef8dc373b0200a616d3cb9b4

      SHA256

      132892b7b6abd090ba2b5cdc9946e45c61630d7531384cf00d8ed66d676d4274

      SHA512

      f8f933aa9b2ee2cf21d920e2a56c8d4dd70e290eec28a9dd1b3c3b86e92f0f3c8b77e5b209c4b108caea790c73c571ede4c0936c82e2a748676d76f06dc20aa3

    • C:\Users\Public\Videos\Read_For_Restore_File.html
      Filesize

      4KB

      MD5

      192083badbf519e4bca7d0fad4e86e89

      SHA1

      6f3c96c419b61b28e3d64d41dbc4c64659f4164c

      SHA256

      e67039432283b78368195374daded87449b2b6d21511992f77d1057e05c01c2d

      SHA512

      edd2f1338ce9d9463fe3a0dc37ef69c63cebad81166bae27809a859ad64628f6313778aace85634cb1635752ab839d8c4d1e444e93754297c8e701f94e11f486

    • memory/1708-0-0x0000000000400000-0x000000000040E200-memory.dmp
      Filesize

      56KB

    • memory/1708-6766-0x0000000000400000-0x000000000040E200-memory.dmp
      Filesize

      56KB