Resubmissions

22-02-2023 03:33

230222-d4e96shf67 10

Analysis

  • max time kernel
    60s
  • max time network
    72s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-02-2023 03:33

General

  • Target

    0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe

  • Size

    75KB

  • MD5

    78f011f6196ab070e05e7e363a0c02f1

  • SHA1

    8d31d3e523d1e11631d05f01c410340cef780bfc

  • SHA256

    0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2

  • SHA512

    a4122de0328bd4f42ccb47b70eb444eac0b63e3f736223dbfca9e43169ee28c542f768ef7a35daf3f50def72a07c579a01241fd162fb0a00d184a270c7617706

  • SSDEEP

    768:FbzkUtPX9DUetap1YOc8tmmSuDsCHJexou+nPp18vjILhussGdamRv5qmppQHUd:SaX1LGfDpRRuI0PuvtOuSG4z

Score
10/10

Malware Config

Extracted

Path

C:\Users\Admin\3D Objects\README_TO_DECRYPT.html

Family

quantum

Ransom Note
<html> <head> <title>Quantum</title> </head> <body> <h1>Your ID:</h1> <b> <pre> e9853c6aaf36c4ece1ec550a7ddbbe332ddd9f4f6eeb986cb9df1248ebdf4435 </pre> </b> <hr/> This message contains an information how to fix the troubles you've got with your network.<br><br> Files on the workstations in your network were encrypted and any your attempt to change, decrypt or rename them could destroy the content.<br> The only way to get files back is a decryption with Key, provided by the Quantum Locker.<br><br> During the period your network was under our control, we downloaded a huge volume of information.<br> Now it is stored on our servers with high-secure access. This information contains a lot of sensitive, private and personal data.<br> Publishing of such data will cause serious consequences and even business disruption.<br><br> It's not a threat, on the contrary - it's a manual how to get a way out.<br> Quantum team doesn't aim to damage your company, our goals are only financial.<br><br> After a payment you'll get network decryption, full destruction of downloaded data, information about your network vulnerabilities and penetration points.<br> If you decide not to negotiate, in 48 hours the fact of the attack and all your information will be posted on our site and will be promoted among dozens of cyber forums, news agencies, websites etc.<br><br> To contact our support and start the negotiations, please visit our support chat.<br> It is simple, secure and you can set a password to avoid intervention of unauthorised persons.<br> <a href="http://22rnyep2aa2exx3fdm26p4onwjfmhciodb55v5l3w4iny7e5bxpg3yad.onion/?cid=e9853c6aaf36c4ece1ec550a7ddbbe332ddd9f4f6eeb986cb9df1248ebdf4435">http://22rnyep2aa2exx3fdm26p4onwjfmhciodb55v5l3w4iny7e5bxpg3yad.onion/?cid=e9853c6aaf36c4ece1ec550a7ddbbe332ddd9f4f6eeb986cb9df1248ebdf4435</a> <ul> <li>Password field should be blank for the first login. <li>Note that this server is available via Tor browser only. </ul> P.S. How to get TOR browser - see at https://www.torproject.org </body> </html>

Signatures

  • Quantum Ransomware

    A rebrand of the MountLocker ransomware first seen in August 2021.

  • Modifies extensions of user files 10 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops desktop.ini file(s) 25 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe
    "C:\Users\Admin\AppData\Local\Temp\0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe"
    1⤵
    • Modifies extensions of user files
    • Drops desktop.ini file(s)
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4972
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\\0E569501.bat" "C:\Users\Admin\AppData\Local\Temp\0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1652
      • C:\Windows\system32\attrib.exe
        attrib -s -r -h "C:\Users\Admin\AppData\Local\Temp\0f3bb820adf6d3bba54988ef40d8188ae48b34b757277e86728bdb8441d01ea2.exe"
        3⤵
        • Views/modifies file attributes
        PID:4300

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\3D Objects\README_TO_DECRYPT.html

    Filesize

    2KB

    MD5

    d8714ac7168930fcf50d1ec1bf900b90

    SHA1

    5e983f5151e69042c6df3c90763475dfa7e2dad2

    SHA256

    cc1620bbc9e812ceac951f835a13d67387307f1cdb09ba1a8c4ab58d10b77d24

    SHA512

    bd4f96ec26c7fc4697d9970fbf72ae4fd53a9e4406ed8d648fba236d06fa151335091d6da60b1e5e007e29bc1e47211c5cdaf6ab7c6d1be7bc2e57e63216190d

  • C:\Users\Admin\AppData\Local\Temp\0E569501.bat

    Filesize

    65B

    MD5

    348cae913e496198548854f5ff2f6d1e

    SHA1

    a07655b9020205bd47084afd62a8bb22b48c0cdc

    SHA256

    c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506

    SHA512

    799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611