Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
09-01-2022 14:20
Static task
static1
Behavioral task
behavioral1
Sample
6143d920ebdd5e9b1db7425916417c0896139f425493a8fcd63d62dac80779f1.bin.dll
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
6143d920ebdd5e9b1db7425916417c0896139f425493a8fcd63d62dac80779f1.bin.dll
Resource
win10-en-20211208
General
-
Target
6143d920ebdd5e9b1db7425916417c0896139f425493a8fcd63d62dac80779f1.bin.dll
-
Size
66KB
-
MD5
cac54670bc5a9fa936487640a718c269
-
SHA1
20f802801a424e2a57ff21e048734fe21f0c57c0
-
SHA256
6143d920ebdd5e9b1db7425916417c0896139f425493a8fcd63d62dac80779f1
-
SHA512
deb19457c7dbc5e865a919936dd9178f80722835fbce4d9f105ce5e6bb4afd8a56dc7b4bb6d3e4b902f88e5321d98ac4daeaa2027e88a3cc4c69d7566fdf1ffe
Malware Config
Signatures
-
Modifies extensions of user files 12 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
rundll32.exedescription ioc process File renamed C:\Users\Admin\Pictures\PublishEdit.crw => \??\c:\Users\Admin\Pictures\PublishEdit.crw.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\ResizeDismount.raw => \??\c:\Users\Admin\Pictures\ResizeDismount.raw.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\UnprotectRestore.raw => \??\c:\Users\Admin\Pictures\UnprotectRestore.raw.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\ConfirmBlock.raw => \??\c:\Users\Admin\Pictures\ConfirmBlock.raw.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\ConvertFromAssert.raw => \??\c:\Users\Admin\Pictures\ConvertFromAssert.raw.quantum rundll32.exe File opened for modification \??\c:\Users\Admin\Pictures\ConvertSkip.tiff rundll32.exe File renamed C:\Users\Admin\Pictures\EnableImport.raw => \??\c:\Users\Admin\Pictures\EnableImport.raw.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\UninstallClear.png => \??\c:\Users\Admin\Pictures\UninstallClear.png.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\ConvertSkip.tiff => \??\c:\Users\Admin\Pictures\ConvertSkip.tiff.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\GrantFormat.png => \??\c:\Users\Admin\Pictures\GrantFormat.png.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\MoveAdd.crw => \??\c:\Users\Admin\Pictures\MoveAdd.crw.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\UninstallCheckpoint.raw => \??\c:\Users\Admin\Pictures\UninstallCheckpoint.raw.quantum rundll32.exe -
Drops desktop.ini file(s) 24 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification \??\c:\Users\Admin\Documents\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Links\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Pictures\Camera Roll\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Downloads\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Libraries\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Desktop\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Downloads\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Favorites\Links\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Pictures\Saved Pictures\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Videos\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Documents\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Music\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Videos\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Contacts\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Pictures\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Saved Games\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Searches\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Desktop\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Pictures\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Favorites\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Music\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\OneDrive\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\AccountPictures\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\desktop.ini rundll32.exe -
Drops file in Program Files directory 2 IoCs
Processes:
rundll32.exedescription ioc process File created \??\c:\Program Files\README_TO_DECRYPT.html rundll32.exe File created \??\c:\Program Files (x86)\README_TO_DECRYPT.html rundll32.exe -
Modifies registry class 5 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\.quantum rundll32.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\.quantum\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\.quantum\shell\Open rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\.quantum\shell\Open\command\ = "explorer.exe README_TO_DECRYPT.html" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\.quantum\shell\Open\command rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 2672 rundll32.exe 2672 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
rundll32.exedescription pid process Token: SeRestorePrivilege 2672 rundll32.exe Token: SeDebugPrivilege 2672 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
rundll32.execmd.exedescription pid process target process PID 2672 wrote to memory of 1328 2672 rundll32.exe cmd.exe PID 2672 wrote to memory of 1328 2672 rundll32.exe cmd.exe PID 1328 wrote to memory of 780 1328 cmd.exe attrib.exe PID 1328 wrote to memory of 780 1328 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6143d920ebdd5e9b1db7425916417c0896139f425493a8fcd63d62dac80779f1.bin.dll,#11⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\\0F75F79F.bat" "C:\Users\Admin\AppData\Local\Temp\6143d920ebdd5e9b1db7425916417c0896139f425493a8fcd63d62dac80779f1.bin.dll""2⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\system32\attrib.exeattrib -s -r -h "C:\Users\Admin\AppData\Local\Temp\6143d920ebdd5e9b1db7425916417c0896139f425493a8fcd63d62dac80779f1.bin.dll"3⤵
- Views/modifies file attributes
PID:780
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
348cae913e496198548854f5ff2f6d1e
SHA1a07655b9020205bd47084afd62a8bb22b48c0cdc
SHA256c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506
SHA512799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611