Analysis

  • max time kernel
    151s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    29-01-2025 08:34

General

  • Target

    2025-01-29_3accf293ba124515006a6772cb88566f_globeimposter.exe

  • Size

    53KB

  • MD5

    3accf293ba124515006a6772cb88566f

  • SHA1

    313f083bd613e8a017e5c2471edacdae7f758752

  • SHA256

    f43e246f70fca07d2c3ea432e12c549ed94cd750ee407a27cd34dffa47aec8b1

  • SHA512

    7270a58555ecb0a27e5385e7a0dce39f1ff315d45e90c7bbe9219fec09c8b211fa5f68b7591e016a7940af1b9861ba159c6b86cbd80031a1ad70eb43449a5dfd

  • SSDEEP

    768:+5Lvuye1kVtGBk6P/v7nWlHznbkVwrEKD9yDwxVSHrowNI2tG6o/t84B5IQhH:CeytM3alnawrRIwxVSHMweio3yQ1

Malware Config

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Globeimposter family
  • Renames multiple (5359) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 30 IoCs
  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-01-29_3accf293ba124515006a6772cb88566f_globeimposter.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-01-29_3accf293ba124515006a6772cb88566f_globeimposter.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    PID:2204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Videos\how_to_back_files.html

    Filesize

    4KB

    MD5

    8363566b6fb6b36096cf592816a66a3d

    SHA1

    1ed63887346da22eadd7095f068e3381b9cb79b4

    SHA256

    0d5783e7c0a46a8b73aa25148c09b3e863c1fcbbb4f0008a641571d76672b63c

    SHA512

    777bc73d292bebafa9f2c90fbc6f9c7e104c31fe5ac2558fdb442514bfa9f87e146a0d96489abbce6c87df90c58bb1f91135bc2ae07816600c35da9c453f3871

  • memory/2204-0-0x0000000000400000-0x000000000040E200-memory.dmp

    Filesize

    56KB

  • memory/2204-160-0x0000000000400000-0x000000000040E200-memory.dmp

    Filesize

    56KB