Resubmissions
22-02-2023 03:33
230222-d4e96shf67 10Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22-02-2023 03:33
Static task
static1
Behavioral task
behavioral1
Sample
0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe
Resource
win10v2004-20230220-en
General
-
Target
0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe
-
Size
75KB
-
MD5
78f011f6196ab070e05e7e363a0c02f1
-
SHA1
8d31d3e523d1e11631d05f01c410340cef780bfc
-
SHA256
0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2
-
SHA512
a4122de0328bd4f42ccb47b70eb444eac0b63e3f736223dbfca9e43169ee28c542f768ef7a35daf3f50def72a07c579a01241fd162fb0a00d184a270c7617706
-
SSDEEP
768:FbzkUtPX9DUetap1YOc8tmmSuDsCHJexou+nPp18vjILhussGdamRv5qmppQHUd:SaX1LGfDpRRuI0PuvtOuSG4z
Malware Config
Extracted
C:\Users\Admin\Desktop\README_TO_DECRYPT.html
quantum
Signatures
-
Quantum Ransomware
A rebrand of the MountLocker ransomware first seen in August 2021.
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exedescription ioc Process File renamed C:\Users\Admin\Pictures\BlockSubmit.png => \??\c:\Users\Admin\Pictures\BlockSubmit.png.quantum 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File renamed C:\Users\Admin\Pictures\DenyDisable.png => \??\c:\Users\Admin\Pictures\DenyDisable.png.quantum 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File renamed C:\Users\Admin\Pictures\PingImport.raw => \??\c:\Users\Admin\Pictures\PingImport.raw.quantum 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Admin\Pictures\SaveOut.tiff 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File renamed C:\Users\Admin\Pictures\SaveOut.tiff => \??\c:\Users\Admin\Pictures\SaveOut.tiff.quantum 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File renamed C:\Users\Admin\Pictures\TraceProtect.png => \??\c:\Users\Admin\Pictures\TraceProtect.png.quantum 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File renamed C:\Users\Admin\Pictures\WaitLock.crw => \??\c:\Users\Admin\Pictures\WaitLock.crw.quantum 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File renamed C:\Users\Admin\Pictures\ApproveGroup.crw => \??\c:\Users\Admin\Pictures\ApproveGroup.crw.quantum 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1396 cmd.exe -
Drops desktop.ini file(s) 26 IoCs
Processes:
0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exedescription ioc Process File opened for modification \??\c:\Users\Public\Pictures\Sample Pictures\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Admin\Downloads\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Admin\Favorites\Links\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Admin\Saved Games\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Admin\Videos\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Public\Downloads\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Public\Libraries\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Public\Pictures\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Public\Recorded TV\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Admin\Music\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Public\Desktop\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Admin\Favorites\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Admin\Links\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Admin\Searches\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Public\Documents\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Public\Music\Sample Music\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Admin\Contacts\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Admin\Desktop\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Admin\Documents\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Admin\Favorites\Links for United States\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Admin\Pictures\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Public\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Public\Music\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Public\Recorded TV\Sample Media\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Public\Videos\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe File opened for modification \??\c:\Users\Public\Videos\Sample Videos\desktop.ini 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe -
Modifies registry class 5 IoCs
Processes:
0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.quantum\shell\Open\command 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.quantum 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.quantum\shell 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.quantum\shell\Open 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.quantum\shell\Open\command\ = "explorer.exe README_TO_DECRYPT.html" 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exepid Process 1528 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe 1528 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exedescription pid Process Token: SeRestorePrivilege 1528 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe Token: SeDebugPrivilege 1528 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.execmd.exedescription pid Process procid_target PID 1528 wrote to memory of 1396 1528 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe 29 PID 1528 wrote to memory of 1396 1528 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe 29 PID 1528 wrote to memory of 1396 1528 0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe 29 PID 1396 wrote to memory of 1612 1396 cmd.exe 31 PID 1396 wrote to memory of 1612 1396 cmd.exe 31 PID 1396 wrote to memory of 1612 1396 cmd.exe 31 -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe"C:\Users\Admin\AppData\Local\Temp\0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\\006C3802.bat" "C:\Users\Admin\AppData\Local\Temp\0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\system32\attrib.exeattrib -s -r -h "C:\Users\Admin\AppData\Local\Temp\0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe"3⤵
- Views/modifies file attributes
PID:1612
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65B
MD5348cae913e496198548854f5ff2f6d1e
SHA1a07655b9020205bd47084afd62a8bb22b48c0cdc
SHA256c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506
SHA512799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611
-
Filesize
65B
MD5348cae913e496198548854f5ff2f6d1e
SHA1a07655b9020205bd47084afd62a8bb22b48c0cdc
SHA256c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506
SHA512799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611
-
Filesize
2KB
MD571998acc8f03ff3b5b8cbe995403dc95
SHA1e2374a082835039f73b6a98bfd0f7c6c969b64d0
SHA256044a1fccf9a01c5e6aa8fa972599976ba044568b0ff5d16034386bde44d91f6d
SHA512fe87771a900defac24023e70078e85935f0d13d7e8e01b687c11b38fde9158a3909ff34a00fd886b4f22c706a2a1350ca439180c44bb518593a09e47db4213c0