Analysis
-
max time kernel
85s -
max time network
90s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2023 03:06
Static task
static1
Behavioral task
behavioral1
Sample
faf49653a0f057ed09a75c4dfc01e4d8e6fef203d0102a5947a73db80be0db1d.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
faf49653a0f057ed09a75c4dfc01e4d8e6fef203d0102a5947a73db80be0db1d.dll
Resource
win10v2004-20230220-en
General
-
Target
faf49653a0f057ed09a75c4dfc01e4d8e6fef203d0102a5947a73db80be0db1d.dll
-
Size
237KB
-
MD5
1ac3f71feece118a03c9e23af063f6d1
-
SHA1
bbc3979075e0574e54a5ead497fcba95fcc78fc0
-
SHA256
faf49653a0f057ed09a75c4dfc01e4d8e6fef203d0102a5947a73db80be0db1d
-
SHA512
5e75afffb1212057a9431818b54c9d08e4714b316593fd1eb4fe4abf49e85c7ca617d3b8206d97f42278060aee95c1e797df1848f178bded21c52773a5fd65c3
-
SSDEEP
3072:xpZMSVmCw3tF6iql+IKDQau58yJ5WIxFGddWMf+fmf7eATjiMRnIle8E:hnm78iqIIRauayJ8rhVT9nIle
Malware Config
Extracted
C:\Users\Admin\3D Objects\README_TO_DECRYPT.html
quantum
Signatures
-
Quantum Ransomware
A rebrand of the MountLocker ransomware first seen in August 2021.
-
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
rundll32.exedescription ioc process File renamed C:\Users\Admin\Pictures\ExitRename.tif => \??\c:\Users\Admin\Pictures\ExitRename.tif.quantum rundll32.exe File opened for modification \??\c:\Users\Admin\Pictures\InitializeProtect.tiff rundll32.exe File renamed C:\Users\Admin\Pictures\InitializeProtect.tiff => \??\c:\Users\Admin\Pictures\InitializeProtect.tiff.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\PublishAdd.tif => \??\c:\Users\Admin\Pictures\PublishAdd.tif.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\UninstallComplete.tif => \??\c:\Users\Admin\Pictures\UninstallComplete.tif.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\WatchRequest.tif => \??\c:\Users\Admin\Pictures\WatchRequest.tif.quantum rundll32.exe -
Drops desktop.ini file(s) 25 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification \??\c:\Users\Admin\Downloads\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Favorites\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Links\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Documents\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Music\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Videos\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Videos\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\AccountPictures\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Music\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\OneDrive\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Pictures\Camera Roll\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Pictures\Saved Pictures\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Saved Games\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Searches\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Downloads\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Pictures\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Contacts\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Favorites\Links\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Libraries\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\3D Objects\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Desktop\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Documents\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Pictures\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Desktop\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\desktop.ini rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3356 4464 WerFault.exe rundll32.exe -
Modifies registry class 5 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\.quantum\shell\Open\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\.quantum rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\.quantum\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\.quantum\shell\Open rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\.quantum\shell\Open\command\ = "explorer.exe README_TO_DECRYPT.html" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 4464 rundll32.exe 4464 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
rundll32.exedescription pid process Token: SeRestorePrivilege 4464 rundll32.exe Token: SeDebugPrivilege 4464 rundll32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
rundll32.execmd.exedescription pid process target process PID 4464 wrote to memory of 3412 4464 rundll32.exe cmd.exe PID 4464 wrote to memory of 3412 4464 rundll32.exe cmd.exe PID 3412 wrote to memory of 4208 3412 cmd.exe attrib.exe PID 3412 wrote to memory of 4208 3412 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\faf49653a0f057ed09a75c4dfc01e4d8e6fef203d0102a5947a73db80be0db1d.dll,#11⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\\0E56D391.bat" """2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\attrib.exeattrib -s -r -h ""3⤵
- Views/modifies file attributes
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4464 -s 3762⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 460 -p 4464 -ip 44641⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\3D Objects\README_TO_DECRYPT.htmlFilesize
2KB
MD5518afc7a84fa8348ed86dd8bf5948696
SHA1a163aa6fdbf872f2795404c5e9de40638ebd5c3e
SHA25696f7339a86df8e1bd2c06162376b9eba377feefc41b1797abe4ebb34a39a5386
SHA512586e86ccbce06644fd6e729d901cacf4ed707e3079bdc2b209fbe2e3ac75bfb9e7718718f3e14f81cec90a88aaca1d7456c2fff8d41c7af8c5d3107e09a9d39e
-
C:\Users\Admin\AppData\Local\Temp\.logFilesize
61KB
MD52faaf31a1027be730d5d14468850901d
SHA161009262e82cdb757bd79e157936cb85f9e42505
SHA2569ebe34a350938038d8b8657bdcc3c0c4f8bb0363f4659419f1e054bbf7750208
SHA512eda4e335410d229d050a5b15b53bc0bbcc537062727885c305526c404b71812d79bbeca29cf30f19a7f2413a2be76e99639d1efdfde82e1a303391d054bec267
-
C:\Users\Admin\AppData\Local\Temp\0E56D391.batFilesize
65B
MD5348cae913e496198548854f5ff2f6d1e
SHA1a07655b9020205bd47084afd62a8bb22b48c0cdc
SHA256c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506
SHA512799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611
-
memory/4464-133-0x00007FF4291A0000-0x00007FF4291B8000-memory.dmpFilesize
96KB
-
memory/4464-135-0x00007FF4291A0000-0x00007FF4291B8000-memory.dmpFilesize
96KB
-
memory/4464-137-0x00007FF4291A0000-0x00007FF4291B8000-memory.dmpFilesize
96KB
-
memory/4464-139-0x00007FF4291A0000-0x00007FF4291B8000-memory.dmpFilesize
96KB
-
memory/4464-190-0x00007FF4291A0000-0x00007FF4291B8000-memory.dmpFilesize
96KB
-
memory/4464-360-0x00007FF4291A0000-0x00007FF4291B8000-memory.dmpFilesize
96KB
-
memory/4464-365-0x00007FF4291A0000-0x00007FF4291B8000-memory.dmpFilesize
96KB
-
memory/4464-363-0x00007FF4291A0000-0x00007FF4291B8000-memory.dmpFilesize
96KB