Analysis

  • max time kernel
    150s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-02-2023 01:25

General

  • Target

    7d80230df68ccba871815d68f016c282.exe

  • Size

    261KB

  • MD5

    7d80230df68ccba871815d68f016c282

  • SHA1

    e10874c6108a26ceedfc84f50881824462b5b6b6

  • SHA256

    f4234a501edcd30d3bc15c983692c9450383b73bdd310059405c5e3a43cc730b

  • SHA512

    64d02b3e7ed82a64aaac1f74c34d6b6e6feaac665ca9c08911b93eddcec66595687024ec576e74ea09a1193ace3923969c75de8733859835fef45335cf265540

  • SSDEEP

    3072:vDKW1LgppLRHMY0TBfJvjcTp5XxG8pt+oSOpE22obq+NYgvPuCEbMBWJxLRiUgV:vDKW1Lgbdl0TBBvjc/M8n35nYgvKjdzi

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\DECRYPT_YOUR_FILES.HTML

Ransom Note
<html> <head> <style> body{ background-color: #3366CC; } h1 { background-color: RGB(249, 201, 16); } p { background-color: maroon; color: white; } </style> </head> <body> <center> <h1><b> Attention ! All your files </b> have been encrypted. </h1></br> <p> Due encrypting was used algoritm RSA-4096 and AES-256, used for protection military secrets.</br> That means > RESTORE YOU DATA POSIBLE ONLY BUYING decryption passwords from us.</br> Getting a decryption of your files is - SIMPLY task.</br></br> That all what you need:</br> 1. Sent Your ID_KEY on mailbox [email protected] or [email protected] </br> 2. For test, decrypt 2 small files, to be sure that we can decrypt you files.</br> 3. Pay our services. </br> 4. GET software with passwords for decrypt you files.</br> 5. Make measures to prevent this type situations again.</br></br> IMPORTANT(1)</br> Do not try restore files without our help, this is useless, and can destroy you data permanetly.</br></br> IMPORTANT(2) </br> We Cant hold you decryption passwords forever. </br>ALL DECRYPTION PASSWORDS, for what wasn`t we receive reward, will destroy after week of moment of encryption. </p> <p> Your ID_KEY: <br> </p> <table width="1024" border="0"> <tbody> <tr> <td><p>PU2oJuShIG/Szs7R9KzYREfVv+/ZX+PsHaPMmgysyEa5gAAVBQqa1aDlB06Ii9Ttej2ZKcLOWU3C6qJzyw1Fm9FTIk8VIrSztQy/x2L68umTCmAIDlVKpcI53pV1LAuY0jgybvFTxFWkMJkMGJcEzjy0CHUz3xKgdoVUQC6+8IFos/yUvwoslCzR82q9UrefIeEoQnmFiUIsLo4ENtQDppOko9wlc3m3frcXHoX6Tq+2L2QGFlk6/EuKMUhO8i2U9yAyW5YxFWJHuKH3qiBJOp3H8tK+p1W7glC9FASaLePaO5I+g3hfbHI7HKqRHfAEPQ4sxlLW+NKP8FyDuVlsVw==ZW4tVVM=</p></td> </tr> </tbody> </table> </center></html></body>

Signatures

  • Fantom

    Ransomware which hides encryption process behind fake Windows Update screen.

  • Disables Task Manager via registry modification
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d80230df68ccba871815d68f016c282.exe
    "C:\Users\Admin\AppData\Local\Temp\7d80230df68ccba871815d68f016c282.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4132
    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe
      "C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"
      2⤵
      • Executes dropped EXE
      PID:908

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\Lang\DECRYPT_YOUR_FILES.HTML

    Filesize

    1KB

    MD5

    065c1e755680c9ff739709bc1f081cbb

    SHA1

    31aa73967da1da15f62f1789d962dbc55a2199f2

    SHA256

    fd817d5b278d3b4ecf85c0fb8c0c39aab72cc71ed3542f5e3612fb0123655340

    SHA512

    ffe871c6f444ea50179c6d01578ffb43d3497d01d771703a450bcda02a31f8b2fe1c8ea8eead9cca4fba509a03c2d172ed2dd6db11023d851f6036e945f8474b

  • C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\win32_LinkNoDrop32x32.gif

    Filesize

    160B

    MD5

    f5832ba731944e10f52a49c78e0cabae

    SHA1

    5dc48df5016de51e029ce9228e267887693cc97b

    SHA256

    38e2165258d35543166283ee402562597b4c55ab07287164e60c6f8d8eaca107

    SHA512

    cb62257f6b71cee1945294a82724294af10d3ad135ee52b659b3d7f0cc71d26f57c3467bfdc372f906b0c2904d35ca6e55b05f7ca3e410e3eaf9a20c69990a27

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html

    Filesize

    12KB

    MD5

    0d4117d8ac7256980511818c474d680e

    SHA1

    bf6febf94188ca1fa1864c00cf78be5ae44965e6

    SHA256

    c0fed9bff3e23bb36b9ae065d4f27b7b37b847385974ea7972db1ae8d48f4d46

    SHA512

    18b16802d9b9f43d3c02ca841adfc4fcb693d21bbd8205baee2b2812c9ce544c2e2c74429b0362445cd940096245cab14daf4b4c0bec94d2bd5a7939f87b5088

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html

    Filesize

    8KB

    MD5

    9f19e54ad73de1f2711bef9075694f3e

    SHA1

    ef2eccd25919c081b67792e259b19c25916894d1

    SHA256

    22635546b4945dd09254b7f5a00e237ee59d6a3b363c82adfe31939b810b602c

    SHA512

    450b4663c73d9b17e808ac66d9bb1852c4d3b086a2c4cebc706b3e402ae547f440fc1211df4786470915357fbbb75340596bba8eb04a63a36a280766948a504d

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

    Filesize

    11KB

    MD5

    687266c42eec21eb9730a325d3c0a79b

    SHA1

    b92d9f2770a83471f19512f880db565ffdfb9995

    SHA256

    587fbdd0c28adbf357c8cd4ad3d46c1414eaa88661faa1ea34460aae24dbf898

    SHA512

    4a769daf6068d0c72cbd2f8d488726ffd028e9da8b8fc0e20f0321f49a65438f1f685b6a1f4ebc5660b3297cca888d4b142751395b69966a03cf24fbfc523fcf

  • C:\Program Files\Java\jre1.8.0_66\THIRDPARTYLICENSEREADME-JAVAFX.txt

    Filesize

    107KB

    MD5

    bde575d9b9419e2458f5832e2ecb5b63

    SHA1

    41b8524bace47106d6b8ed03e3b58cc92ed77885

    SHA256

    0ddcd48b0410709a184ad2b6478afb16831e480f33b773aa5cd826703c4f5ae0

    SHA512

    792133bc2d6a98e5a6a026393b040b30e887c94c13d488334342f56b5a6623b24af6625be65bffaff777b16c95b53d29249464f003f761af482a6ee1fc368670

  • C:\Program Files\Java\jre1.8.0_66\THIRDPARTYLICENSEREADME.txt

    Filesize

    172KB

    MD5

    713dee8fb7e84a52a1ab954498828dd9

    SHA1

    b2127b45b86ff8c121af8739fe37b362faba1f05

    SHA256

    92e38109486362ba76a5f8d1dc3a9b747ff6abed360a8543b8310b6e75889a5e

    SHA512

    38c53fac6baf28018c884342674ce3a67d5d063407bcaf6cf48d27b3c2cf921ffcd2e6e0c4b58cd03743d0199ac89ca4d4bca9aea0704fbcaead1f56dc69bb00

  • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

    Filesize

    48B

    MD5

    9e27d93a9c58f8e1548cb7b9b68c04e3

    SHA1

    8c71df3888495a0ac6cae58b73d1f68d5420f277

    SHA256

    133244dd2b53acdd040ae4d5ac19c9bcb9621fbf9982e5112961843d2ec197a5

    SHA512

    3c2a73c76b1165c16ce3110b63bfb35ebdbb4909ffcd7aedb98fc83eb820b589c47923933deaf3afdb4eeee83e674fd9dc9e2fe321a71793a7c97f1595680369

  • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe

    Filesize

    21KB

    MD5

    fec89e9d2784b4c015fed6f5ae558e08

    SHA1

    581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2

    SHA256

    489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065

    SHA512

    e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24

  • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe

    Filesize

    21KB

    MD5

    fec89e9d2784b4c015fed6f5ae558e08

    SHA1

    581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2

    SHA256

    489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065

    SHA512

    e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24

  • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe

    Filesize

    21KB

    MD5

    fec89e9d2784b4c015fed6f5ae558e08

    SHA1

    581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2

    SHA256

    489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065

    SHA512

    e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24

  • memory/908-299-0x00000000007E0000-0x00000000007F0000-memory.dmp

    Filesize

    64KB

  • memory/908-280-0x0000000000030000-0x000000000003C000-memory.dmp

    Filesize

    48KB

  • memory/908-656-0x00000000007E0000-0x00000000007F0000-memory.dmp

    Filesize

    64KB

  • memory/4132-178-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-194-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-156-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-150-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-158-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-160-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-162-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-164-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-166-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-168-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-170-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-172-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-174-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-176-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-154-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-180-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-182-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-184-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-186-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-188-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-190-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-192-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-195-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB

  • memory/4132-152-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-196-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB

  • memory/4132-198-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB

  • memory/4132-199-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-260-0x0000000004B50000-0x00000000050F4000-memory.dmp

    Filesize

    5.6MB

  • memory/4132-261-0x0000000005100000-0x0000000005192000-memory.dmp

    Filesize

    584KB

  • memory/4132-262-0x0000000005230000-0x000000000523A000-memory.dmp

    Filesize

    40KB

  • memory/4132-263-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB

  • memory/4132-148-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-146-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-144-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-142-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-140-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-138-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-136-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-133-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-134-0x0000000002560000-0x000000000258B000-memory.dmp

    Filesize

    172KB

  • memory/4132-264-0x0000000002770000-0x0000000002771000-memory.dmp

    Filesize

    4KB

  • memory/4132-265-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB

  • memory/4132-266-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB

  • memory/4132-267-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB

  • memory/4132-268-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB