Analysis

  • max time kernel
    32s
  • max time network
    39s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-02-2023 01:46

General

  • Target

    sample/quantumlocker64_faf496.dll

  • Size

    237KB

  • MD5

    1ac3f71feece118a03c9e23af063f6d1

  • SHA1

    bbc3979075e0574e54a5ead497fcba95fcc78fc0

  • SHA256

    faf49653a0f057ed09a75c4dfc01e4d8e6fef203d0102a5947a73db80be0db1d

  • SHA512

    5e75afffb1212057a9431818b54c9d08e4714b316593fd1eb4fe4abf49e85c7ca617d3b8206d97f42278060aee95c1e797df1848f178bded21c52773a5fd65c3

  • SSDEEP

    3072:xpZMSVmCw3tF6iql+IKDQau58yJ5WIxFGddWMf+fmf7eATjiMRnIle8E:hnm78iqIIRauayJ8rhVT9nIle

Score
10/10

Malware Config

Extracted

Path

C:\README_TO_DECRYPT.html

Family

quantum

Ransom Note
<html> <head> <title>Quantum</title> </head> <body> <h1>Your ID:</h1> <b> <pre> ac76ebfba8f313e3035387cd174939e0388eb268ddbd1c8201799fd203769b39 </pre> </b> <hr/> This message contains an information how to fix the troubles you've got with your network.<br><br> Files on the workstations in your network were encrypted and any your attempt to change, decrypt or rename them could destroy the content.<br> The only way to get files back is a decryption with Key, provided by the Quantum Locker.<br><br> During the period your network was under our control, we downloaded a huge volume of information.<br> Now it is stored on our servers with high-secure access. This information contains a lot of sensitive, private and personal data.<br> Publishing of such data will cause serious consequences and even business disruption.<br><br> It's not a threat, on the contrary - it's a manual how to get a way out.<br> Quantum team doesn't aim to damage your company, our goals are only financial.<br><br> After a payment you'll get network decryption, full destruction of downloaded data, information about your network vulnerabilities and penetration points.<br> If you decide not to negotiate, in 48 hours the fact of the attack and all your information will be posted on our site and will be promoted among dozens of cyber forums, news agencies, websites etc.<br><br> To contact our support and start the negotiations, please visit our support chat.<br> It is simple, secure and you can set a password to avoid intervention of unauthorised persons.<br> <a href="http://tijykgureh7kqq5cczzeutaoxvmf6yinpar72o3bxome7b44vwqxadyd.onion/?cid=ac76ebfba8f313e3035387cd174939e0388eb268ddbd1c8201799fd203769b39">http://tijykgureh7kqq5cczzeutaoxvmf6yinpar72o3bxome7b44vwqxadyd.onion/?cid=ac76ebfba8f313e3035387cd174939e0388eb268ddbd1c8201799fd203769b39</a> <ul> <li>Password field should be blank for the first login. <li>Note that this server is available via Tor browser only. </ul> P.S. How to get TOR browser - see at https://www.torproject.org </body> </html>

Signatures

  • Quantum Ransomware

    A rebrand of the MountLocker ransomware first seen in August 2021.

  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops desktop.ini file(s) 24 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\sample\quantumlocker64_faf496.dll,#1
    1⤵
    • Modifies extensions of user files
    • Drops desktop.ini file(s)
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3796
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\\0E571A8D.bat" """
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4888
      • C:\Windows\system32\attrib.exe
        attrib -s -r -h ""
        3⤵
        • Views/modifies file attributes
        PID:528
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 3796 -s 432
      2⤵
      • Program crash
      PID:1692
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2448

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\README_TO_DECRYPT.html

      Filesize

      2KB

      MD5

      b7f6959164e820e178cf8a31fe982940

      SHA1

      ade9490ff6c1e393ad44756274f0999770ae05e7

      SHA256

      fc88a0e27b674dede4ec1535cd3210481719c1ea98d44558ca413fbcbbf1df49

      SHA512

      41ff1781645a00dc5f7c9ad27016ea3a47b02ed04d0e34068f105cf74387d2597847a56e99feb0151302b068c691d1df0d5ebea8f33ce7392a2797f282d23a42

    • C:\Users\Admin\AppData\Local\Temp\0E571A8D.bat

      Filesize

      65B

      MD5

      348cae913e496198548854f5ff2f6d1e

      SHA1

      a07655b9020205bd47084afd62a8bb22b48c0cdc

      SHA256

      c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506

      SHA512

      799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611

    • C:\Users\Admin\AppData\Local\Temp\sample\.log

      Filesize

      64KB

      MD5

      beb197fbb0feea94e44fd053dde081b5

      SHA1

      edc46284fcdbf9e63b09c984a1cddf3b36abb16b

      SHA256

      915af8896051755f8e0d1d0c77591f90db8b302f31a923179537fe3702e9abd5

      SHA512

      6770cc1df3e78c62d71c359fd6de8409a7a846db6289bde80e8da76492ed7255e3dfa2209ea793e574f1a71823041475204a4ad884a3b28d8fc9f9f77785a95e

    • memory/3796-121-0x00007FF75C0C0000-0x00007FF75C0D8000-memory.dmp

      Filesize

      96KB

    • memory/3796-122-0x00007FF75C0C0000-0x00007FF75C0D8000-memory.dmp

      Filesize

      96KB

    • memory/3796-125-0x00007FF75C0C0000-0x00007FF75C0D8000-memory.dmp

      Filesize

      96KB

    • memory/3796-127-0x00007FF75C0C0000-0x00007FF75C0D8000-memory.dmp

      Filesize

      96KB

    • memory/3796-351-0x00007FF75C0C0000-0x00007FF75C0D8000-memory.dmp

      Filesize

      96KB

    • memory/3796-352-0x00007FF75C0C0000-0x00007FF75C0D8000-memory.dmp

      Filesize

      96KB

    • memory/3796-354-0x00007FF75C0C0000-0x00007FF75C0D8000-memory.dmp

      Filesize

      96KB

    • memory/3796-365-0x00007FF75C0C0000-0x00007FF75C0D8000-memory.dmp

      Filesize

      96KB