Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe
Resource
win10v2004-20240412-en
General
-
Target
d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe
-
Size
53KB
-
MD5
22ff4b883468f0b2b21b2c50d5ca5bd9
-
SHA1
e34f09cf8f1416ab4611a6a18ff99281fad93c70
-
SHA256
d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893
-
SHA512
9b37dff34d3ceca993bebda8e6d3f4f4a361af65ec6bdde4be54021be2dc48c176aa0b0ef2bae8433ca2957d5e3c28fe448465c3f816a5ee36a5d395bd8f4405
-
SSDEEP
1536:oWOeytM3alnawrRIwxVSHMweio36l990:oWOey23alnaEIN/W6lA
Malware Config
Extracted
C:\Users\Public\Music\Sample Music\how_to_back_files.html
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Renames multiple (7507) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1844 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe" d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe -
Drops file in Program Files directory 64 IoCs
Processes:
d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exedescription ioc process File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Things\how_to_back_files.html d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME16.CSS d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Solstice.xml d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-core-kit.xml d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.felix.gogo.command_0.10.0.v201209301215.jar d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105376.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Baku d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGATNGET.DPV d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\DataListIconImagesMask.bmp d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01368_.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB3B.BDR d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01628_.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099168.JPG d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0239951.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TN00218_.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MinionPro-Bold.otf d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Kolkata d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\ext\locale\updater_ja.jar d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\CAMERA.WAV d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl.css d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\TECHTOOL.GIF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02386_.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TN00011_.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File created C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\how_to_back_files.html d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.swt.win32.win32.x86_64.nl_ja_4.4.0.v20140623020002.jar d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.equinox.p2.rcp.feature_1.2.0.v20140523-0116\how_to_back_files.html d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationUp_ButtonGraphic.png d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL102.XML d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\EN00222_.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN095.XML d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\ModuleAutoDeps\org-netbeans-core.xml d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\ACADEMIC.ONE d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OLMAIL.FAE d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\WINWORD_COL.HXC d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR41F.GIF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Barbados d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00148_.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0321179.JPG d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00014_.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\1 Top.accdt d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099167.JPG d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0324704.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Vostok d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_travel_Thumbnail.bmp d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0214934.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File created C:\Program Files\Microsoft Office\Office14\1033\how_to_back_files.html d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Guam d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OL.SAM d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR51B.GIF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\GrayCheck\TAB_ON.GIF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TN00330_.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\CodeFile.zip d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\content-types.properties d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\DELETE.GIF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\Dynamic.pdf d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\Visualizer.zip d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\MEDIA\EXPLODE.WAV d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightYellow.css d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BORDERS\MSART11.BDR d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolIcons\WSS_DocLib.ico d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101859.BMP d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152626.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SECURS.ICO d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exedescription pid process target process PID 2172 wrote to memory of 1844 2172 d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe cmd.exe PID 2172 wrote to memory of 1844 2172 d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe cmd.exe PID 2172 wrote to memory of 1844 2172 d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe cmd.exe PID 2172 wrote to memory of 1844 2172 d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe"C:\Users\Admin\AppData\Local\Temp\d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe > nul2⤵
- Deletes itself
PID:1844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5028299c409fe68d428d9abb68eb721f9
SHA153c011e0eafe7346c30023c2d7c76a2a65527532
SHA25607e3dd5c7922c1cc0affa34c6cb0b0d58d1de76a4fbbc1bc8209713526d0edd1
SHA512d8f9fe649d3aeed09df515eceb2dc5088b8306356e797354317911c9177fac1f1a8c84454b06a04391b24551e83fb9c5701dd937490764024be04e93a59c580c