Analysis
-
max time kernel
121s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 11:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe
-
Size
53KB
-
MD5
522e839f0581331b49e657ed1b7d07be
-
SHA1
96c0693071dadaec7ab413468cd1692641a876fa
-
SHA256
87a9cf743545b76277e88442e784f0dda6701fb10abfba6c0adc75feaec3de28
-
SHA512
47ae3120496d56a0796269dd08b9d5a6cae6732fa9b591a2507531e05402154b8529ca5b4616d04df92cca2596a39c330a45b8fb92f49fde3cd99df900e73fd2
-
SSDEEP
768:lTH9vuye1kVtGBk6P/v7nWlHznbkVwrEKD9yDwxVSHrowNI2tG6o/t84B5vvVv:feytM3alnawrRIwxVSHMweio3Z
Malware Config
Extracted
C:\Users\Public\Music\Sample Music\how_to_back_files.html
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Globeimposter family
-
Renames multiple (7272) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1864 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe" 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 64 IoCs
Processes:
2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exedescription ioc process File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\vlc.mo 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-12 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl\TAB_OFF.GIF 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187837.WMF 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0197979.WMF 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SL00712_.WMF 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Fancy\PLUS.GIF 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsHomePage.html 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\Places\how_to_back_files.html 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152708.WMF 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105638.WMF 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File created C:\Program Files\Java\jre7\lib\zi\Australia\how_to_back_files.html 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\com.oracle.jmc.executable.win32.win32.x86_64_5.5.0 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\sysinfo.bat 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BabyBlue\TAB_ON.GIF 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\NOTE.CFG 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18211_.WMF 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Horizon.xml 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152690.WMF 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\how_to_back_files.html 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\fonts\LucidaTypewriterRegular.ttf 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File created C:\Program Files (x86)\MSBuild\how_to_back_files.html 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGWEBHD.XML 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\DiscussionToolIconImages.jpg 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationLeft_SelectionSubpicture.png 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt.fca 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-modules.xml 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\NavigationUp_ButtonGraphic.png 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\dotsdarkoverlay.png 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18253_.WMF 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0088542.WMF 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\CG1606.WMF 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107514.WMF 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_pressed.gif 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\background.gif 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File created C:\Program Files\VideoLAN\VLC\locale\gl\LC_MESSAGES\how_to_back_files.html 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Windhoek 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE03459_.WMF 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.apache.batik.util.gui_1.7.0.v200903091627.jar 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.views.nl_zh_4.4.0.v20140623020002.jar 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-print.xml 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-favorites.xml 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\LISTBOX.JPG 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\RECL.ICO 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00122_.WMF 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\core\locale\core_visualvm.jar 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\btn-next-static.png 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\kn\LC_MESSAGES\vlc.mo 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File created C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\how_to_back_files.html 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-api-progress.xml 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\eclipse_update_120.jpg 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\OUTLOOK_COL.HXC 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\Tabs.accdt 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382969.JPG 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-spi-actions.xml 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\bin\setNetworkClientCP.bat 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\JUNGLE.HTM 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0177257.JPG 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-lib-uihandler_zh_CN.jar 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\ext\dnsns.jar 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BORDERS\MSART9.BDR 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\sunjce_provider.jar 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Budapest 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-actions_zh_CN.jar 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXE2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf000000000200000000001066000000010000200000008a743301b0250c6a81a536702e0f3f579a883cebfe511cdef18631f74061100e000000000e800000000200002000000093b95ee6ebdcee342faad6ff09e6845c31f3a1480faa93d25970a7919ccc874d90000000af7e28dfca02eb1a87b90727138c9afe7c9a31c0c3eb212e6860bc0ea476372b9eb20d01a6eafddf0425f6d8e1948ee69e1debd1ba6bfa41714b47333306c2dae9d39228da54775808ad202e886197618315d6e885f13ff088aa5562b9a468fece160c3a464c19710591893568082c58021ba2a7c516d7e3e39e741c3f386835dffb592d428feac00faa0d86c5d3948e400000004289dcca5a350d811af68367dfdf0e19778b189cd314f40b4f22cdd8179ddaa1f26e0bb3bc7f52e770f775b52f0ff8bf23bbd32a921d51f882e26680b0e2ebd0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "438351693" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom\ZoomFactor = "75000" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c4c29f0b3cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Height = "21" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a907cc1344750743988d8bab481dbfbf0000000002000000000010660000000100002000000012e4f74dc09e99d9b584bd96f2ecc48abd33ca7620b2bf5b371039710ed0d0c7000000000e8000000002000020000000b3c989ecbaf192bec0d6896add073cd717ef8691392f68e1bd48745f4a0a826520000000afd7d14f849785a7ebd3b203b078006a4b59e7831f8516c5a8c7cf94265c6e5440000000102c8b0c8d02ebd89ca903c5557539d5c36f4b8a7aa8d7af57edce2e2e42f8e690739d4fb8b543e78fe20ee04feb536c5e77279c00c0660195660415dccdf809 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom\ZoomFactor = "50000" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CB35D001-A7FE-11EF-B387-F234DE72CD42} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Modifies registry class 5 IoCs
Processes:
IEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WINWORD.EXE IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml\OpenWithList\WINWORD.EXE IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml IEXPLORE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mhtml\OpenWithList IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 348 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 348 iexplore.exe 348 iexplore.exe 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE 2276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
iexplore.exe2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exedescription pid process target process PID 348 wrote to memory of 2276 348 iexplore.exe IEXPLORE.EXE PID 348 wrote to memory of 2276 348 iexplore.exe IEXPLORE.EXE PID 348 wrote to memory of 2276 348 iexplore.exe IEXPLORE.EXE PID 348 wrote to memory of 2276 348 iexplore.exe IEXPLORE.EXE PID 1272 wrote to memory of 1864 1272 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe cmd.exe PID 1272 wrote to memory of 1864 1272 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe cmd.exe PID 1272 wrote to memory of 1864 1272 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe cmd.exe PID 1272 wrote to memory of 1864 1272 2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\2024-09-30_522e839f0581331b49e657ed1b7d07be_globeimposter.exe > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1864
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\how_to_back_files.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2276
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e5fd7fa6caa4dc23abd1b1e59b4e231
SHA15b4e38b589493ff6b47aa4d8771428ea0f07d146
SHA256833f8fca04236dff076a8ff01a59b2904e8341a2736557a815799317f2895541
SHA512d4a0c994c44ff3696babf258ba597c34979557b18b2e1bf44845325b9469e9cbefdd71cbb93abd3f2ae9e85f94886f5f77670fdba68135c6675bedd1ae9e1d90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b8385df10761f214f4f772c25383b6e
SHA19a6d6edc57c8254d43386f7dab1e8a40806bf9d9
SHA256d11363745a043a1f1e8735dc28edb1ff80afbb7912ed2a88d54ed183312b71d2
SHA512e57ef3349d7c69c7b294ad98851d3aec204d7023b740b249d5b9c90847b0adc272619ddcf4bd02dd7aa3cce7e8499edf1a2b3861593ec30a867d430b1e7ff27d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c971b7a1a2eb84a24fde8071cba5887f
SHA1628905d3e3143762cd6a84b410743ba043dc675f
SHA25656539612246f5db27271749a6019f255cc9c9f8604ec78080188cf452f7ea787
SHA512e43c35b5689ff87f42fb405e31c63d661389ce1c5eafbf003fc69208e59cde87e5827b74ff7eae83503e2b3e03f73486f867d574cc2b2d64d31078ef439acaf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d2a963e353cf1083508ae618d57e4ce
SHA1443bc95b7ead4dd91efabc72216007ab4d25f8d7
SHA256f11f138c048f61b48a2e0f3853e61de0c7c5a4f994f174b86109517e4f3f9b65
SHA512093633062c13726f32278a78b68d08e975e4754872eac661f192447a64626b12a5db37a246ec64af99cb0fb65923f8b1075b7fae561d9e0290542bf71831c4bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52677767c065a40077f04930af3ca0b97
SHA1eaf866ec63445627f89ece4b3f7b4c382950dbd6
SHA256f0741ad50a22bd2a79a7ce21582f30014211b6b0087a8ef5d6dcca1b6e64f3ba
SHA512b6b46f29725a770dc92f887eb6db12b2517b82c56e167ae3eddd05568b99786c41bd79bf7f36dcd0638dc4dd507ff1165c069782e921315617c79e71a3635d01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f842165f84f8f1ff3f8853837acb0b3b
SHA17695ef8753f4b658e7cbfdc430493c52b0df9cd3
SHA256c58f64302d5546a8b3d27f25223831ecc1cb5bc91035858034b997a638e639ab
SHA5127acf744bcc7c38e9b3fbe4a27544ea15f16f46a06035d5ac4737fbcea817b3655a508aa3ca313b92d7cc4b07ec12ba7de4abe5681f3fa4b99c78d4f14a9d11b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579dece027b640c704d03ac209d4abe75
SHA16fa3f5541c0be4b816da6a0c8aadd1a2d141977a
SHA2561bfd0d7ed5aefba20298adcd7c837d09f4f38601a37489f8d08ce459507aa7ae
SHA512e210c83862646272915ca305b3896bc483f2b9bc0c032d7acbf2f92bc3c94fb2c40c08079e22d8798b0b35978ce23ec7d97d31aff3f606eb5c85aff663b1b587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9dff24d72e9c164e3cee20e1a4b87c2
SHA1f604202bc3fa1bc8fca3cdca5ceea05281a38c99
SHA2569883f88665f58c0c9a2c7bdf1b5faed15d4c77b2912aaf559d4c3bf6e2ad62e6
SHA51265661355495957edb3accf22c434df7a716eedea2af959945fdd66182a979446ec6de2f6cf9b0a5fcf71bab0334ceafe9e57a02a513f40226ea8f6917ac9164a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfd3eb866ed59d5956983a0585cb574d
SHA1c99a7fa9d85e3d9d92ab7acbd2eb96f8d734a124
SHA25687003e69a4bac5c741536cab5ac3ec993d43621a20caaa573b89767ec379d74a
SHA512b9842dc44d73c581382e37a0a6a6d6b835f611d548ebca0829295f4816c528966a3db5bf1bf59530849b29d908b9cd07ff0dfa67c964fcb16617cd94678d3f3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569211bff636b7c8f2b24c8fbeeefad2e
SHA1b882a34f35c0770f03732f62d556f4fce07d6041
SHA25652225d52f7250ef8ed6e09aa190585635012b2135da595fb6627a28679b693fb
SHA512e63aa2e77854c2b38a09491a8958a246446ade3376d2c83753e7e6a5e880cfc098a1067e5a3849e17c5c1a8170fdab2e415e2a741c77714bf6a982d9f464cfd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b56d6f747e91500b4115e405158086a
SHA1ab755ea03543be2e2faefec50796f61dfc178d16
SHA2568bbcf2cc0ae0be49a1c8156a40f6041210133b6f91891214a2bdda2a98245f26
SHA512723f32a7f6a9112db45e30df0d7db64b7ee66e39d9d18aef8976c5601be57ea339e0386f22e967f14bb5bdb95a7cedac360b2097811200c99a74cd50892c110f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ab3bef852b43a05f46ac7327924564c
SHA1c06603ca328e0e75d3a4891aa27083ea9b7ea5a1
SHA256796f3f577e1be9f20d377d04b61654f570de6cf433929ed15ef76be278735754
SHA512b2983448861d88e533030c72c8e1589cd22cf21c8acf5f8ba5559b6ee826005d962f2bc3fc8a84bdae3e9c00bf0ebe968f0222fd4c844330ee725029b54585f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8234e6e0da29d2d92c53d088dc4d916
SHA14056e5420efdbba23678473fe3d6333f43a35241
SHA25675287e3ba68b6e02728b95f40b96271bde7f06375a9f522181950799d499ce5a
SHA51237c20a893b1b4a8bc328864106aa45009bce834ce6895c77c03ea08ca4bbae0db1e3d3b42a5c9fdc9df0d5c7af3c072a0a23e3d0f40c4bbba9c479b67f0e1f4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bbdd983da9bbd9a74bca9bca961630a
SHA1a2ab1da053eebb545d4f94a1eaea741c0c58e405
SHA25657c332ecb70654dcf8b8b4d059994957817d66e63a35cd5eab1b16d85e7b9817
SHA51215b4285e86a369aca3f9b7976e28c16edcbf9d1e05916a19b78663105c51742fc7d2aae12dc0074bdb9eb68b359ff404e2231f5caf5ca8762f884ee245652a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2d6b465178359d1bafe7ba976d82afe
SHA1e0eac40a0ae1104d23f9c825f47b54684d8e7bd0
SHA25616fb76c7123672c53796abf77422f53dd442cec643068ef3f2ec464d11cae472
SHA5128d0c9cbb2b87355bddab474320002b4dbd7a2091191cbb7550c9cd540d42eb82b0f62c9f94ac82e8424e7e6cf240d76f9b61f999150c4151134c956422af8d13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564eb798fa7ca1508bd074c208d18bacd
SHA19a70184fd52f979d8c889a82603321f08357b2de
SHA25699559aa3acf9a4e9560e0155f229198473d4c6cd82c65f9d81c4c5929d9d2b36
SHA5125a5a3db462694112a0cd69512473654e835f2d7a359fe5628c95d70fc79c29f50e58a72082aaa2d3fd56dbf18f9c05a75470832b17abf4a437bfa144b9a1b8ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b39c1e1ab6226b332d62160cc01ba10
SHA1b4e545003ff11ae6dd76677559bf57283513a740
SHA2565f410729c5a52ae792a677e95100cb01b5e333d890138725bd20c2568a95279d
SHA51207556311a89d3bb7de9ad1aeb8b6c22ae19e541a1522722275a62d50e1c0e33d1abdb4b2b80c6b17df8e00da831a9e05985f2ecd7a2d74d50c2a4c486cfbfe03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f70d9b792b78dcff14b8a1198b8d4e6
SHA10a9bc72c835fe116255f61f61f436228e1cd8ab5
SHA25698a0d6dd1c7902837ca057129d0a0fdef2362674d48ada23e8604748b90c2bac
SHA5120a7c0a77aca010cb5924506d052e634e1f676b7fc049c506f9a7c55f4d837870c880f3fa664ff9330ba019992c003b399cf232dac1121d78dbb7faabe4290e2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512997fb13296980177575cf9918a10ce
SHA1ae593c810ee951387c4e7fa50ba7a24d84431e3d
SHA2560ddef519bf71486e5d54a6027be7d649a6f56a04a61f205d2c1504f94a397abe
SHA512865eb8b1da1281de8839ea12691a27e997dbdc6fdba7d21edda9638cc3faabf303b88d0c81c28d00f7a889dc66b33a93875312a2bfccb60743867953cda5c53d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a59851e179bcce2689dbe0f141f8350a
SHA1a87c2f62b6c9822f9f4688f2c9144a486de52476
SHA256a3853951ea86f2caa36f0c311c17ea4f581410a34f09150ecd069e5630f32a1d
SHA512a61f4d4b6266bf2f28435076cbb21bd5d3503290c23a35651b18ea52429d5118382440d863d331207e066641ddc05f75eb3643480c35da8002f8a463da555752
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
4KB
MD5774596c7a1c5ceabe539ce01032c75df
SHA13da3ce94430dc62317dc8a9705066ccdfe1102ed
SHA2561f26ec76cfb6e0bd272ff61233f054bd86437608609a84f1465dd360de76188b
SHA512b8b9c452ae8963b06e6216bd48961f26948328eda44bba3b316b73096bdb2c643292f514ef3bb03248284f68b751a3bc972636fb0e8ce473a999b6507c3099ad