Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
63s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22/02/2023, 21:35
Static task
static1
Behavioral task
behavioral1
Sample
Fantom.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Fantom.exe
Resource
win10v2004-20230220-en
General
-
Target
Fantom.exe
-
Size
261KB
-
MD5
7d80230df68ccba871815d68f016c282
-
SHA1
e10874c6108a26ceedfc84f50881824462b5b6b6
-
SHA256
f4234a501edcd30d3bc15c983692c9450383b73bdd310059405c5e3a43cc730b
-
SHA512
64d02b3e7ed82a64aaac1f74c34d6b6e6feaac665ca9c08911b93eddcec66595687024ec576e74ea09a1193ace3923969c75de8733859835fef45335cf265540
-
SSDEEP
3072:vDKW1LgppLRHMY0TBfJvjcTp5XxG8pt+oSOpE22obq+NYgvPuCEbMBWJxLRiUgV:vDKW1Lgbdl0TBBvjc/M8n35nYgvKjdzi
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\DECRYPT_YOUR_FILES.HTML
Signatures
-
Fantom
Ransomware which hides encryption process behind fake Windows Update screen.
-
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1788 WindowsUpdate.exe -
Loads dropped DLL 1 IoCs
pid Process 1104 Fantom.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-jvm.xml Fantom.exe File created C:\Program Files\Windows Photo Viewer\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\SpecialNavigationRight_ButtonGraphic.png Fantom.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\feature.xml Fantom.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ecf.filetransfer_5.0.0.v20140827-1444.jar Fantom.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\about.html Fantom.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\ARCTIC\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-sa.xml Fantom.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_windy.png Fantom.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\bg_OliveGreen.gif Fantom.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\cpyr.htm Fantom.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-options-keymap.xml Fantom.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\config\Modules\org-netbeans-modules-profiler-selector-api.xml Fantom.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\main.css Fantom.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Orange Circles.htm Fantom.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Classic.dotx Fantom.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\join.avi Fantom.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\scrapbook.png Fantom.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-javahelp_ja.jar Fantom.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_gray_few-showers.png Fantom.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Median.thmx Fantom.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\calendar.js Fantom.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.security_1.2.0.v20130424-1801.jar Fantom.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-options_zh_CN.jar Fantom.exe File created C:\Program Files\VideoLAN\VLC\locale\tl\LC_MESSAGES\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jface.databinding.nl_zh_4.4.0.v20140623020002.jar Fantom.exe File created C:\Program Files\VideoLAN\VLC\locale\bn_IN\LC_MESSAGES\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\gadget.xml Fantom.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPBlue.png Fantom.exe File created C:\Program Files\VideoLAN\VLC\locale\as_IN\LC_MESSAGES\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Casual.css Fantom.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4-dark_win.css Fantom.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-api-annotations-common_zh_CN.jar Fantom.exe File created C:\Program Files\VideoLAN\VLC\locale\ta\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\de-DE\css\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsptg.xml Fantom.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\NextMenuButtonIcon.png Fantom.exe File created C:\Program Files\VideoLAN\VLC\locale\fi\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\VideoLAN\VLC\locale\hy\LC_MESSAGES\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\VideoLAN\VLC\locale\es\LC_MESSAGES\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\curl-hot.png Fantom.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\gadget.xml Fantom.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.core.di_1.4.0.v20140414-1837.jar Fantom.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-sampler.xml Fantom.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files (x86)\Common Files\SpeechEngines\Microsoft\TTS20\es-ES\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Swirl\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\Passport.wmv Fantom.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.win32.nl_zh_4.4.0.v20140623020002.jar Fantom.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\picturePuzzle.js Fantom.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.renderers.swt.nl_zh_4.4.0.v20140623020002.jar Fantom.exe File created C:\Program Files\Java\jre7\lib\security\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_right_hover.png Fantom.exe File created C:\Program Files\Common Files\System\msadc\es-ES\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\TitleButtonSubpicture.png Fantom.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\button-bullet.png Fantom.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\jaccess.jar Fantom.exe File created C:\Program Files\VideoLAN\VLC\lua\sd\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\drag.png Fantom.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\144DPI\(144DPI)notConnectedStateIcon.png Fantom.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1104 Fantom.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1104 Fantom.exe Token: 33 964 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 964 AUDIODG.EXE Token: 33 964 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 964 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1104 wrote to memory of 1788 1104 Fantom.exe 32 PID 1104 wrote to memory of 1788 1104 Fantom.exe 32 PID 1104 wrote to memory of 1788 1104 Fantom.exe 32 PID 1104 wrote to memory of 1788 1104 Fantom.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fantom.exe"C:\Users\Admin\AppData\Local\Temp\Fantom.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"2⤵
- Executes dropped EXE
PID:1788
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:924
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5581⤵
- Suspicious use of AdjustPrivilegeToken
PID:964
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59c522395d32abc963d313bb3740c5d9d
SHA1605a3419625d2fc03e1cbf5ce6063e945c29b973
SHA25645c71f96e2e53b153a04b7596674c24b6eacca3694d72ff46247fd4b9e58b19c
SHA51256645214952485a6bb7c98470201764dc85b290ef47470eb4cc2be364e5c97eeb1ebf0e800db00272a9a39ab92f442febb2b73ab80215ffa9599f1aadba9b749
-
Filesize
160B
MD50e6005f1866ec6a441d2bda15cb3be65
SHA11a9c7a4e3be0fd2f0f0ccb16f65dae272e8c2ab4
SHA256422d562a3a6e107916dbfd45e6f719906bc623c8cc626e8edc95e70bab13ad0e
SHA51290b9609408268644605c004211cd8f0901b4963a4b77f7b016762927450746c013aed5974841e2dd517121668f17104fe7aadbdd1a56302c38708da93f174a2e
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize12KB
MD53e3c075d3531686a90285048d11aacf4
SHA1e533bafd230d6075df8846e13dcd7b10890db79d
SHA2564d907752de7aee8d1f44e804f8879bc1b5c0afa93e7363f5920315c65fde1a6b
SHA512c71edda0f06961d98db6ecfc34aadb614326b8035f71c73994cfe96ed9532980e4a7beff2f82c142bd28bd0fee5b1ed96b579820e9ecfcfe95ef1aa2b5fb035b
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize8KB
MD58ab774dca6213961cf292e016b1cef42
SHA14743177258e8095214556563c8cc69f677935dc0
SHA256f19d2f306fad18ccd76600525e194625b908b4b2945f567758e7cf03b6981dab
SHA512f54af39213300238adf047672d1f195736e25a1c895e0940c870adef9f45d23a1670282a3fb93226b09fc06640f64feff88c3b48c0d0bedc4b1619009981c2d4
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt
Filesize11KB
MD51a54ed06d413a1a5186d04a39ed56ddf
SHA1d197b689cb84bf026b01f30dedc7a0348dbdd941
SHA256a83958cab31c1047b4d8f50edb870183e42b57bc58d5fb694598fd30ecadced9
SHA512f186752ffc9dd7f61425a6f738888ef7645e3dee685d1dd4ec26e40c2d5c604342af9a6eaea58338eb6ede85ce5572448b9236fdbbc4c46820b142fd66681e14
-
Filesize
109KB
MD54c24e4eb5c7b9baf9b23ce2b2d1596b7
SHA11833e4ee970d9c8d40ab9e63e3ed4d76530e7cd3
SHA256561b052b6b7e7a2847a431ce9c3f36ccddd2dc0bb70f8ce87288ab7fba5331c4
SHA512b54a646c2475b0ea3b8842caecd05cd6ff6902400701c6d505373377db70d5e63d91fe66a6ddd9b91bac0e41af77da6fa81d12c8d1cf9b1ce72beaca2aa85243
-
Filesize
172KB
MD582eab84af319ef0ab510e04ce786b274
SHA13ae401d4934c4127921698144122c2581bc5e0db
SHA256083cfbcc6b68f3c6a272511646f427de45255d3d28931342bd4c6b12cf34cee9
SHA512ca7f2ac659322dc1da930d622c2d97f46d75dec4f9485c76c738633a058af8cf6e59a3a71440dc18e403effaa663c747889818fad4d99ca9b9086d321b7885bd
-
Filesize
21KB
MD5fec89e9d2784b4c015fed6f5ae558e08
SHA1581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2
SHA256489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065
SHA512e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24
-
Filesize
21KB
MD5fec89e9d2784b4c015fed6f5ae558e08
SHA1581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2
SHA256489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065
SHA512e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24
-
Filesize
21KB
MD5fec89e9d2784b4c015fed6f5ae558e08
SHA1581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2
SHA256489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065
SHA512e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24