Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/02/2025, 19:27
Static task
static1
Behavioral task
behavioral1
Sample
d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe
Resource
win10v2004-20250217-en
General
-
Target
d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe
-
Size
53KB
-
MD5
22ff4b883468f0b2b21b2c50d5ca5bd9
-
SHA1
e34f09cf8f1416ab4611a6a18ff99281fad93c70
-
SHA256
d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893
-
SHA512
9b37dff34d3ceca993bebda8e6d3f4f4a361af65ec6bdde4be54021be2dc48c176aa0b0ef2bae8433ca2957d5e3c28fe448465c3f816a5ee36a5d395bd8f4405
-
SSDEEP
1536:oWOeytM3alnawrRIwxVSHMweio36l990:oWOey23alnaEIN/W6lA
Malware Config
Extracted
C:\Users\Public\Music\Sample Music\how_to_back_files.html
Signatures
-
GlobeImposter
GlobeImposter is a ransomware first seen in 2017.
-
Globeimposter family
-
Renames multiple (7495) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 584 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\BrowserUpdateCheck = "C:\\Users\\Admin\\AppData\\Local\\d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe" d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGBOXES.XML d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightOrange\button.gif d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD08773_.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00693_.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File created C:\Program Files\Java\jre7\lib\cmm\how_to_back_files.html d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0178523.JPG d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\PPKLite.api d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File created C:\Program Files\Microsoft Games\Mahjong\it-IT\how_to_back_files.html d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File created C:\Program Files\Java\jdk1.7.0_80\how_to_back_files.html d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\jvmti.h d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\ChessIconImagesMask.bmp d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange.css d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21335_.GIF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382962.JPG d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\SIGN.DPV d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\J0143745.GIF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\VideoLAN\VLC\COPYING.txt d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Chuuk d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.bindings.nl_zh_4.4.0.v20140623020002.jar d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.bindings_0.10.200.v20140424-2042.jar d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Newsprint.xml d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00040_.GIF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0309598.JPG d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH01607U.BMP d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\uz\LC_MESSAGES\vlc.mo d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Marketing Projects.accdt d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15020_.GIF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01566_.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Windows Journal\it-IT\jnwmon.dll.mui d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\org.eclipse.rcp_root_4.4.0.v20141007-2301 d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR9B.GIF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00235_.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_basestyle.css d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.core_5.5.0.165303\feature.xml d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\REPTWIZ.POC d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN081.XML d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18235_.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-bootstrap.xml d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-openide-actions.jar d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsPreviewTemplate.html d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Verve.xml d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099177.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File created C:\Program Files\VideoLAN\VLC\locale\ast\LC_MESSAGES\how_to_back_files.html d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\whiteband.png d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02097_.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File created C:\Program Files\VideoLAN\VLC\plugins\how_to_back_files.html d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\PST8 d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\POWERPNT.DEV_COL.HXT d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14516_.GIF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AG00126_.GIF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0216153.JPG d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-keyring_ja.jar d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\javax.servlet_3.0.0.v201112011016.jar d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\1033\AboutBox.zip d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\NOTEL.ICO d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Opulent.thmx d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA02431_.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE03451_.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File created C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\how_to_back_files.html d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Kathmandu d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\flower_trans_matte.wmv d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\EADOCUMENTAPPROVAL_REVIEW.XSN d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04196_.WMF d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 584 2688 d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe 32 PID 2688 wrote to memory of 584 2688 d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe 32 PID 2688 wrote to memory of 584 2688 d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe 32 PID 2688 wrote to memory of 584 2688 d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe"C:\Users\Admin\AppData\Local\Temp\d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\d9135507e8dbcf15a852ec34623ea6b6d633e10032c94f187ef357ba821af893.exe > nul2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:584
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5b6fb5f50345778fc44c7790639577af6
SHA1ac31c23e0a37c4c17113d77e5525f9730bf6a236
SHA2561d9871271109bb1da6d9fe2246fb2d505b921d0ef340818bc1d4ad88a44c0ed5
SHA5123b533fa7f321ac0e251d8fcf0e22b152ef0da9aa6123d30ad9443f1be2e20f0351933c56eca90c90253ec074822c23d1908fd373646de4379263fa61c4a1e66e