Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-06-2024 14:43

General

  • Target

    2024-06-14_a8eca3e966b26811c05b1824931a4049_globeimposter.exe

  • Size

    53KB

  • MD5

    a8eca3e966b26811c05b1824931a4049

  • SHA1

    300bbee88bdf3244c4aeec592764c00f3c011698

  • SHA256

    b4cb77890f8ce75b538ba09ceea0c1ca38089b188396c7ee3bccc14e2937c218

  • SHA512

    c0740f6eb94f8b732e16c41d7b65155056073ae29e8d814ee2ce156c4f4fb37c85c714a7768931da28efb1deead8e10920480d644777282da34c0ea6ec0f7925

  • SSDEEP

    1536:BjkfV+KJolntwrbDSTWvTwhQMhmpdLZT:B4fIKJolntGDT5qm3LZT

Malware Config

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Renames multiple (8356) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Drivers directory 22 IoCs
  • Manipulates Digital Signatures 2 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 56 IoCs
  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-14_a8eca3e966b26811c05b1824931a4049_globeimposter.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-14_a8eca3e966b26811c05b1824931a4049_globeimposter.exe"
    1⤵
    • Drops file in Drivers directory
    • Manipulates Digital Signatures
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/592-0-0x0000000000400000-0x000000000040E200-memory.dmp

    Filesize

    56KB

  • memory/592-353-0x0000000000400000-0x000000000040E200-memory.dmp

    Filesize

    56KB