Analysis
-
max time kernel
49s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 15:34
Static task
static1
Behavioral task
behavioral1
Sample
d6d78dd3190e9b80975ed8e281bd4d60N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d6d78dd3190e9b80975ed8e281bd4d60N.exe
Resource
win10v2004-20240802-en
General
-
Target
d6d78dd3190e9b80975ed8e281bd4d60N.exe
-
Size
53KB
-
MD5
d6d78dd3190e9b80975ed8e281bd4d60
-
SHA1
96934ee9d9d8fe3b531331fe1fc578e66591304b
-
SHA256
204999f72452d3245497aca2e878dde751eff81cf11ceb7d8d17cc6cf8dc03d4
-
SHA512
c4e6b3846b3724f7728c971421bfe336b69737289126dcdcb255b0515eb56ec2735f3e47bb8e19743e0681552d6c3002ff266c683079c73c0aa54598e004177b
-
SSDEEP
768:3Ovuye1kVtGBk6P/v7nWlHznbkVwrEKD9yDwxVSHrowNI2tG6o/t84B5ZoiJ:3keytM3alnawrRIwxVSHMweio3To
Malware Config
Extracted
C:\Users\Public\Videos\How_to_back_files.html
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Renames multiple (7469) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 1672 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\d6d78dd3190e9b80975ed8e281bd4d60N.exe" d6d78dd3190e9b80975ed8e281bd4d60N.exe -
Drops desktop.ini file(s) 38 IoCs
description ioc Process File opened for modification C:\Users\Public\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Admin\Links\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Public\Music\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-940600906-3464502421-4240639183-1000\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Public\Documents\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Admin\Searches\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Public\Pictures\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Public\Desktop\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Public\Videos\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Public\Libraries\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Public\Downloads\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Admin\Videos\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Admin\Music\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Users\Admin\Documents\desktop.ini d6d78dd3190e9b80975ed8e281bd4d60N.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH02298_.WMF d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0313965.JPG d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01293_.WMF d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Kosrae d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-options-api.xml d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui_5.5.0.165303.jar d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL010.XML d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00602_.WMF d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.ui.zh_CN_5.5.0.165303.jar d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\203x8subpicture.png d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSPUB.DEV_COL.HXC d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0387604.JPG d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Microsoft Games\Multiplayer\Spades\fr-FR\ShvlRes.dll.mui d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.flightrecorder.controlpanel.ui.configuration_5.5.0.165303.jar d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\AssemblyInfoInternal.zip d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SpringGreen\TAB_OFF.GIF d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02862_.WMF d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT+4 d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd-BoldOblique.otf d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_diagonals-thick_20_666666_40x40.png d6d78dd3190e9b80975ed8e281bd4d60N.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\How_to_back_files.html d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-options-keymap_zh_CN.jar d6d78dd3190e9b80975ed8e281bd4d60N.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\How_to_back_files.html d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GRAPH_COL.HXC d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21297_.GIF d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\DataType\Tags.accft d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\PULLQUOTEBB.POC d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\groove.net\Servers\RELAY.CER d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00601_.WMF d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0297229.WMF d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\ExportPush.au d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Java\jre7\lib\cmm\CIEXYZ.pf d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.engine.nl_zh_4.4.0.v20140623020002.jar d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.Interop.InfoPath.SemiTrust.xml d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\REPTWIZ.POC d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\HST d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0387578.JPG d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding_1.4.2.v20140729-1044.jar d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Java\jre7\lib\cmm\GRAY.pf d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.net_1.2.200.v20120807-0927.jar d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OUTLOOK.DEV.HXS d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107344.WMF d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00235_.WMF d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Omsk d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\MSPUB10.BDR d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\org-openide-modules.jar d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0293240.WMF d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01805_.WMF d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00267_.WMF d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\CORPCHAR.TXT d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Executive.eftx d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0178632.JPG d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\eu\LC_MESSAGES\vlc.mo d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director.app.nl_ja_4.4.0.v20140623020002.jar d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\BG_ADOBE.GIF d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18254_.WMF d6d78dd3190e9b80975ed8e281bd4d60N.exe File created C:\Program Files\VideoLAN\VLC\locale\ks_IN\LC_MESSAGES\How_to_back_files.html d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Tongatapu d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Bogota d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\J0143749.GIF d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0292278.WMF d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\Madeira d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Santiago d6d78dd3190e9b80975ed8e281bd4d60N.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.di.nl_zh_4.4.0.v20140623020002.jar d6d78dd3190e9b80975ed8e281bd4d60N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6d78dd3190e9b80975ed8e281bd4d60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1672 1956 d6d78dd3190e9b80975ed8e281bd4d60N.exe 32 PID 1956 wrote to memory of 1672 1956 d6d78dd3190e9b80975ed8e281bd4d60N.exe 32 PID 1956 wrote to memory of 1672 1956 d6d78dd3190e9b80975ed8e281bd4d60N.exe 32 PID 1956 wrote to memory of 1672 1956 d6d78dd3190e9b80975ed8e281bd4d60N.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6d78dd3190e9b80975ed8e281bd4d60N.exe"C:\Users\Admin\AppData\Local\Temp\d6d78dd3190e9b80975ed8e281bd4d60N.exe"1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\d6d78dd3190e9b80975ed8e281bd4d60N.exe > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f2adb08e29baffeefff62396784dc643
SHA12145555b3dc4642b5e408a534c72566981865c14
SHA256b00131a86ac5384cb0acfd9ad1e611ada5deb74e9694cae6b525b1d822ea4cad
SHA5120db7bdb75092bcef5ed0f6759285ef934bbd1cb88983c328316fc575226c45de4788f23350e37d7c3c6851fcec4b15a9e7491d201c934c0f6196b7a7ef33fb0a
-
Filesize
4KB
MD54f6921eb27100247b1417f9242fc59ce
SHA1456fe6686e2899d075bae974530a36e6f79021b6
SHA25673829b44b6f94cde1197bfcda552dc5c41dc538e5836568cbb725532253b7f8d
SHA5128da9292b16d6a2f838c28f8d73b1e34cc092cc9b350ee14aff22bfdd4ab4fc2520942577e63f6efab514eb37437c7c3ebff442029f7bfff7fa2aa1f9c359ec50