Analysis
-
max time kernel
125s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
26/02/2025, 07:08
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe
Resource
win10v2004-20250217-en
General
-
Target
2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe
-
Size
53KB
-
MD5
91bd0b85cea886e49a28feeb72aed5d8
-
SHA1
fd4df46ac3b7ce3e0817b4426b99e3b505818d80
-
SHA256
7ef6352f29723ff4f3702fd5e6d041695ccda89105d47b6aff5bf87521fe2345
-
SHA512
3ee45ad61fea9fb9a6e15198d4956154610a53409ed0c5fb643d1acf819246fa12ffdbd4c904e439846dd0bb1ae656c21c29d0a9519a483ea5fa8e77282910a8
-
SSDEEP
768:uTHskvuye1kVtGBk6P/v7nWlHznbkVwrEKD9yDwxVSHrowNI2tG6o/t84B5v5E9r:x2eytM3alnawrRIwxVSHMweio3Z5i
Malware Config
Extracted
C:\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\HOW_TO_BACK_FILES.html
Signatures
-
Renames multiple (6049) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteAppList.targetsize-256.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\fi-fi\ui-strings.js 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\en-il\ui-strings.js 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Mira.Core.Engine.winmd 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\winamp2.xml 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\DigSig.api 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\pl-pl\HOW_TO_BACK_FILES.html 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsAppList.targetsize-24.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Microsoft.Msn.Controls\EndOfLife\Assets\farewell.jpg 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxManifest.xml 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_x64__8wekyb3d8bbwe\resources.pri 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\themes\dark\[email protected] 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\sendforcomments.svg 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\ExchangeSmallTile.scale-200.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPointVL_MAK-pl.xrm-ms 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\pl-pl\ui-strings.js 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\SmallTile.scale-100_contrast-white.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\StoreLogo.scale-200.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\hu\msipc.dll.mui 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_Trial-ul-oob.xrm-ms 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardR_Trial-pl.xrm-ms 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\CROATIAN.TXT 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\info.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Inbox.Shared.winmd 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.scale-200_contrast-white.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\OneNoteAppList.scale-100.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\resources.pri 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsAlarms_10.1906.2182.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AlarmsSmallTile.contrast-black_scale-125.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\javafx\glib.md 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_x64__8wekyb3d8bbwe\Assets\MixerBranding\Mixer_logo_half-White_RGB.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\AppxBlockMap.xml 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\Weather_LogoSmall.targetsize-24.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\hu-hu\HOW_TO_BACK_FILES.html 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.targetsize-72_altform-lightunplated.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Slice.thmx 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\ThankYou\GenericEnglish-1.jpg 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\font\CameraSymbols.ttf 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\sl-si\HOW_TO_BACK_FILES.html 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\convertpdf-selector.js 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_filter-hover_32.svg 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-100_8wekyb3d8bbwe\resources.pri 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Audio\Skype_File_Transfer_Incoming.m4a 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-white\PeopleAppList.targetsize-40_altform-lightunplated.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Dial\RotateX.PNG 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedSplash.scale-100_contrast-white.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\zh-cn\HOW_TO_BACK_FILES.html 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\RTL\contrast-black\SmallTile.scale-200.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubStoreLogo.scale-200_contrast-black.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxA-GoogleCloudCache.scale-150.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.NET.Native.Runtime.1.7_1.7.25531.0_x64__8wekyb3d8bbwe\logo.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-icons_ef8c08_256x240.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\_Resources\22.rsrc 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-40_contrast-high.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.contrast-black_scale-80.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardR_Grace-ppd.xrm-ms 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\fi-fi\ui-strings.js 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-60_altform-unplated_contrast-white.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Work\contrast-black\SmallTile.scale-200.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\contrast-black\WideTile.scale-200.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-white_targetsize-64_altform-unplated.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\eu-ES\View3d\3DViewerProductDescription-universal.xml 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\2876_24x24x32.png 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Membership.MeControl\Assets\OfflinePages\Scripts\Me\MeControl\offline\en-US\webviewCore.min.js 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000_Classes\⫔鳑쨀蠀\ = "danger_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000_Classes\danger_auto_file\shell\Read OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000_Classes\danger_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000_Classes\danger_auto_file OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000_Classes\.danger\ = "danger_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000_Classes\ OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000_Classes\danger_auto_file\shell\Read\command OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000_Classes\danger_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe\" \"%1\"" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000_Classes\.danger OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000_Classes\\ = "danger_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000_Classes\⫔鳑쨀蠀 OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1920 msedge.exe 1920 msedge.exe 4500 msedge.exe 4500 msedge.exe 4980 identity_helper.exe 4980 identity_helper.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2388 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 2388 OpenWith.exe 2388 OpenWith.exe 2388 OpenWith.exe 2388 OpenWith.exe 2388 OpenWith.exe 2388 OpenWith.exe 2388 OpenWith.exe 2388 OpenWith.exe 2388 OpenWith.exe 2388 OpenWith.exe 2388 OpenWith.exe 2388 OpenWith.exe 2388 OpenWith.exe 2388 OpenWith.exe 2388 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2364 2388 OpenWith.exe 98 PID 2388 wrote to memory of 2364 2388 OpenWith.exe 98 PID 2388 wrote to memory of 2364 2388 OpenWith.exe 98 PID 4500 wrote to memory of 3840 4500 msedge.exe 105 PID 4500 wrote to memory of 3840 4500 msedge.exe 105 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 3792 4500 msedge.exe 106 PID 4500 wrote to memory of 1920 4500 msedge.exe 107 PID 4500 wrote to memory of 1920 4500 msedge.exe 107 PID 4500 wrote to memory of 3060 4500 msedge.exe 108 PID 4500 wrote to memory of 3060 4500 msedge.exe 108 PID 4500 wrote to memory of 3060 4500 msedge.exe 108 PID 4500 wrote to memory of 3060 4500 msedge.exe 108 PID 4500 wrote to memory of 3060 4500 msedge.exe 108 PID 4500 wrote to memory of 3060 4500 msedge.exe 108 PID 4500 wrote to memory of 3060 4500 msedge.exe 108 PID 4500 wrote to memory of 3060 4500 msedge.exe 108 PID 4500 wrote to memory of 3060 4500 msedge.exe 108 PID 4500 wrote to memory of 3060 4500 msedge.exe 108 PID 4500 wrote to memory of 3060 4500 msedge.exe 108 PID 4500 wrote to memory of 3060 4500 msedge.exe 108 PID 4500 wrote to memory of 3060 4500 msedge.exe 108 PID 4500 wrote to memory of 3060 4500 msedge.exe 108 PID 4500 wrote to memory of 3060 4500 msedge.exe 108 PID 4500 wrote to memory of 3060 4500 msedge.exe 108 PID 4500 wrote to memory of 3060 4500 msedge.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\2025-02-25_91bd0b85cea886e49a28feeb72aed5d8_globeimposter.exe > nul2⤵
- System Location Discovery: System Language Discovery
PID:3580
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Desktop\WriteMove.pdf.danger"2⤵
- System Location Discovery: System Language Discovery
PID:2364
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Desktop\EnableJoin.wmx.danger"1⤵
- System Location Discovery: System Language Discovery
PID:5012
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Desktop\EnableJoin.wmx.danger"1⤵
- System Location Discovery: System Language Discovery
PID:4088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\HOW_TO_BACK_FILES.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffbd5646f8,0x7fffbd564708,0x7fffbd5647182⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,17498995042341907865,9067620265690382286,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,17498995042341907865,9067620265690382286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,17498995042341907865,9067620265690382286,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,17498995042341907865,9067620265690382286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,17498995042341907865,9067620265690382286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,17498995042341907865,9067620265690382286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4672 /prefetch:82⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,17498995042341907865,9067620265690382286,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4672 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,17498995042341907865,9067620265690382286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4364 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,17498995042341907865,9067620265690382286,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,17498995042341907865,9067620265690382286,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,17498995042341907865,9067620265690382286,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:3352
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3120
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1152
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5fc02a71f9bd51914ed5d9f617c9065d3
SHA1b0b42852944c711001e31646c5f8e408cc7be79d
SHA256530f1a613bd16dac5543c0f42fa769aaac20cbbc0ba212cf2f60c8fd355df03c
SHA512ca675f563715945c8425c7e58721292484f98dbde2f913b500c2295ad94d854910ae70cd6b6f51fb7d80dd74f0f994bb0c96668835c3aa19840ff65fb2c69830
-
Filesize
152B
MD594bd9c36e88be77b106069e32ac8d934
SHA132bd157b84cde4eaf93360112d707056fc5b0b86
SHA2568f49a43a08e2984636b172a777d5b3880e6e82ad25b427fef3f05b7b4f5c5b27
SHA5127d4933fae6a279cc330fde4ae9425f66478c166684a30cec9c5c3f295289cf83cbdf604b8958f6db64b0a4b1566db102fbcbdcdb6eca008d86d9a9c8b252ff16
-
Filesize
152B
MD525f87986bcd72dd045d9b8618fb48592
SHA1c2d9b4ec955b8840027ff6fd6c1f636578fef7b5
SHA256d8b542281740c12609279f2549f85d3c94e6e49a3a2a4b9698c93cca2dce486c
SHA5120c8a0d1a3b0d4b30773b8519a3d6e63d92973733da818ca9838599a9639e18df18ce31ebf56f46f6bbb7d89d10c726f4d73781e154d115a6068a3be7dd12b314
-
Filesize
6KB
MD5ed49092bb879e3c309254a360d20c3d0
SHA1f90a14d79140cb44f5edc5dff54889203a820498
SHA256416cb1e9e81d25b537d55dea55b05b2ddc3c2803d25fc2b9d9ec5640fe2ed812
SHA512a3b2d9f4916945c5f5f7735cea28271aa190a9882825b76e25978d06a71ad0dc9c17ebb868321d6f890daf9dbca26cf3af1f266f0f632df869c1540a059de83c
-
Filesize
6KB
MD5833dd2f35c632cd8072c7f0c99e6631e
SHA187cd5e861e70474a67199180409ca5dcd504b627
SHA256a5f3bdb6c00af6146969d2f3a0f5b7daeb867b564252f83e70fc5124b287daae
SHA512f960ba2fdd805bb0100e5c8f37b8c78d952bb4cf74b552690c74ce7b7b9d99c39feebe5fa58a7c24efb60136f4b45ab44628fcc377945a1e6c96ee3b606ee975
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD5cc4c57f75eaf91a6cb56988999f3d67a
SHA1d5b1d8d9d787841b68187ab88f0bd1489e1d2311
SHA25641358821213e3d91a7a220bbba553c2be49ee46cbf4528d21e9a89500f4ef73a
SHA5126bd8bcc3bf1865102889ac78ef1ecf90dc3b8deb64249e2435d062c3f65fd62049dad710b13341737798b21b1f5513c1072c35bcc583cbb2cd7b34d68744d180
-
Filesize
328KB
MD5dd65f4e4957f16dd997e48df6824b0bb
SHA15e44e4a118b918799dd113bb1e169a3f28e21757
SHA256e345fd846b846cd68ec2fd287fc092b083dd69b15a8cf0f3643db9c5f3e3d5fe
SHA5125aadb3b6f02e4ee44757ae6c216730637b8d5d17e74eb8eaac6c23297d21389d58f4d9cb850b22a70c5156e0a37fb8044ebb0690da9d024caf7e997eb7795006