Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
2025-03-21_40bf68ccfd6cc1e938c30faff5ea82eb_globeimposter
-
Size
55KB
-
Sample
250321-rt82dsvkv5
-
MD5
40bf68ccfd6cc1e938c30faff5ea82eb
-
SHA1
47cecf43767573b747dbd90eb867309b317a1f31
-
SHA256
f097296a2299a5647911101d715f20a718124729114cd20c451354d653fbee11
-
SHA512
ce754158c6ed422959b221cc0099ece44f45de8c34e92dfa9b8c5c739f262d604f8b6439a965ca24c72b2ac80a4a6f0df7e1858daf2cd62a6a27f4bce9380da0
-
SSDEEP
1536:8bgutzZi79QlgTHf4tq6KhxXwr3+i/EM:8tz479QlOWWXKpf
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-21_40bf68ccfd6cc1e938c30faff5ea82eb_globeimposter.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-21_40bf68ccfd6cc1e938c30faff5ea82eb_globeimposter.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
C:\Users\Public\Videos\how_to_back_files.html
Extracted
C:\Users\Public\Pictures\how_to_back_files.html
Targets
-
-
Target
2025-03-21_40bf68ccfd6cc1e938c30faff5ea82eb_globeimposter
-
Size
55KB
-
MD5
40bf68ccfd6cc1e938c30faff5ea82eb
-
SHA1
47cecf43767573b747dbd90eb867309b317a1f31
-
SHA256
f097296a2299a5647911101d715f20a718124729114cd20c451354d653fbee11
-
SHA512
ce754158c6ed422959b221cc0099ece44f45de8c34e92dfa9b8c5c739f262d604f8b6439a965ca24c72b2ac80a4a6f0df7e1858daf2cd62a6a27f4bce9380da0
-
SSDEEP
1536:8bgutzZi79QlgTHf4tq6KhxXwr3+i/EM:8tz479QlOWWXKpf
-
Globeimposter family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8706) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Clears Network RDP Connection History and Configurations
Remove evidence of malicious network connections to clean up operations traces.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Hide Artifacts
1Hidden Files and Directories
1Indicator Removal
4Clear Network Connection History and Configurations
1File Deletion
3Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1