Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-02-2025 08:23

General

  • Target

    2025-02-13_700edcce509ddcb71a31d1b3765004c2_globeimposter.exe

  • Size

    50KB

  • MD5

    700edcce509ddcb71a31d1b3765004c2

  • SHA1

    0a19d5d16d772853e0ae32d8ccf09454b51bbfc2

  • SHA256

    1ad20ff4f0ba0af89d3af59c4e9d6015df5b4ee90472f576a4dd578c5bff4c84

  • SHA512

    12558b1c47813b3049e99e80e0649b9aa7ab0eec8796f965969fb9b30d742e68e9b3915a8a209e3cc53e8a7ad1bee27e342115b4f3c89aa26f0025df2bbaf03f

  • SSDEEP

    768:fqAFvuye1kVtGBk6P/v7nWlHznbkVwrEKD9yDwxVSHrowNI2tG6o/t84B5uF:zeytM3alnawrRIwxVSHMweio3

Malware Config

Signatures

  • GlobeImposter

    GlobeImposter is a ransomware first seen in 2017.

  • Globeimposter family
  • Renames multiple (8655) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 38 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-02-13_700edcce509ddcb71a31d1b3765004c2_globeimposter.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-02-13_700edcce509ddcb71a31d1b3765004c2_globeimposter.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\2025-02-13_700edcce509ddcb71a31d1b3765004c2_globeimposter.exe > nul
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini

    Filesize

    1KB

    MD5

    9623249a6c543702de35227607f918d4

    SHA1

    6c5a6254c5536480511723cf67086f0b296f215f

    SHA256

    d34f56f32d78de629abf57d6a81d09c72f7d1c7b7ad5cbf2fc5449135f1d2767

    SHA512

    be0ad59d399ec1e263b2b8971dd2ff37d9ffd080956747150ae66977c210d1381461900b0aba374a1ee516427a44efb1b9bc6fff3c841e1a88ea2e380e064efa

  • C:\Users\Public\Videos\README.TXT

    Filesize

    1KB

    MD5

    10e98f54b6e35b3e328eefec1d72f280

    SHA1

    52d06ef795c8af25c563d29d368ba44697d2c0bd

    SHA256

    2bf35f1c281795d28e6f8d0ee9844be1e976229dfe6ca645139e050cf0b026ca

    SHA512

    8d18f62eea68fc206b479a8c9faafac8cacd3f6b68685d8b0935d8f43bd65e34e30e4ee805b6510e45bcfa63e46c47b7b7cbb21896b48718b57a277fbe516e12

  • memory/1924-0-0x0000000000400000-0x000000000040D400-memory.dmp

    Filesize

    53KB

  • memory/1924-1709-0x0000000000400000-0x000000000040D400-memory.dmp

    Filesize

    53KB