Analysis
-
max time kernel
41s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
27-02-2023 17:25
Static task
static1
Behavioral task
behavioral1
Sample
a2eecf17e60223705e045692e1b84228d3b978300fac235c621a9c015f2a2936.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a2eecf17e60223705e045692e1b84228d3b978300fac235c621a9c015f2a2936.dll
Resource
win10v2004-20230220-en
General
-
Target
a2eecf17e60223705e045692e1b84228d3b978300fac235c621a9c015f2a2936.dll
-
Size
77KB
-
MD5
c1fbbf273c1e4094f6bf0cdde36d2764
-
SHA1
bcf4ed6e49e30c5ab9e0fdfcaf5ee8e2756cc98a
-
SHA256
a2eecf17e60223705e045692e1b84228d3b978300fac235c621a9c015f2a2936
-
SHA512
a66ddd695b9d4e45e32c210deca5e02005d3f005742d491b223a4eafd3a391f16d6028580efcb91638555a28f11015259cdb1b80ef1040554992e51a7f4eb669
-
SSDEEP
1536:6aX1IbkVQJih8Ls2RZYbz+n26HNmAC6Usgt4:rKntfmzK2736Us6
Malware Config
Extracted
C:\Users\Admin\Desktop\README_TO_DECRYPT.html
quantum
Extracted
C:\Users\Admin\Desktop\README_TO_DECRYPT.html
quantum
http://tijykgureh7kqq5cczzeutaoxvmf6yinpar72o3bxome7b44vwqxadyd.onion/?cid=ac76ebfba8f313e3035387cd174939e03682a865ccbd0e8e01799fd203769b61
Signatures
-
Quantum Ransomware
A rebrand of the MountLocker ransomware first seen in August 2021.
-
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
rundll32.exedescription ioc process File renamed C:\Users\Admin\Pictures\SetUse.crw => \??\c:\Users\Admin\Pictures\SetUse.crw.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\CompleteDeny.png => \??\c:\Users\Admin\Pictures\CompleteDeny.png.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\ConvertFromShow.tif => \??\c:\Users\Admin\Pictures\ConvertFromShow.tif.quantum rundll32.exe File opened for modification \??\c:\Users\Admin\Pictures\RestartProtect.tiff rundll32.exe File renamed C:\Users\Admin\Pictures\RestartProtect.tiff => \??\c:\Users\Admin\Pictures\RestartProtect.tiff.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\GrantCompare.raw => \??\c:\Users\Admin\Pictures\GrantCompare.raw.quantum rundll32.exe File opened for modification \??\c:\Users\Admin\Pictures\OpenSkip.tiff rundll32.exe File renamed C:\Users\Admin\Pictures\OpenSkip.tiff => \??\c:\Users\Admin\Pictures\OpenSkip.tiff.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\SaveNew.crw => \??\c:\Users\Admin\Pictures\SaveNew.crw.quantum rundll32.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1792 cmd.exe -
Drops desktop.ini file(s) 26 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification \??\c:\Users\Public\Videos\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Contacts\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Documents\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Desktop\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Libraries\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Videos\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Recorded TV\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Videos\Sample Videos\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Desktop\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Downloads\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Favorites\Links\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Pictures\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Downloads\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Music\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Pictures\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Pictures\Sample Pictures\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Favorites\Links for United States\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Music\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Saved Games\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Recorded TV\Sample Media\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Music\Sample Music\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Favorites\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Links\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Searches\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Documents\desktop.ini rundll32.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1D702DA1-B6CC-11ED-B8E8-C6F40EA7D53E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Modifies registry class 5 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\.quantum\shell\Open\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\.quantum rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\.quantum\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\.quantum\shell\Open rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\.quantum\shell\Open\command\ = "explorer.exe README_TO_DECRYPT.html" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 1976 rundll32.exe 1976 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
rundll32.exedescription pid process Token: SeRestorePrivilege 1976 rundll32.exe Token: SeDebugPrivilege 1976 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1460 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1460 iexplore.exe 1460 iexplore.exe 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
rundll32.execmd.exeiexplore.exedescription pid process target process PID 1976 wrote to memory of 1792 1976 rundll32.exe cmd.exe PID 1976 wrote to memory of 1792 1976 rundll32.exe cmd.exe PID 1976 wrote to memory of 1792 1976 rundll32.exe cmd.exe PID 1792 wrote to memory of 756 1792 cmd.exe attrib.exe PID 1792 wrote to memory of 756 1792 cmd.exe attrib.exe PID 1792 wrote to memory of 756 1792 cmd.exe attrib.exe PID 1460 wrote to memory of 1528 1460 iexplore.exe IEXPLORE.EXE PID 1460 wrote to memory of 1528 1460 iexplore.exe IEXPLORE.EXE PID 1460 wrote to memory of 1528 1460 iexplore.exe IEXPLORE.EXE PID 1460 wrote to memory of 1528 1460 iexplore.exe IEXPLORE.EXE -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a2eecf17e60223705e045692e1b84228d3b978300fac235c621a9c015f2a2936.dll,#11⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\\006C3B0E.bat" "C:\Users\Admin\AppData\Local\Temp\a2eecf17e60223705e045692e1b84228d3b978300fac235c621a9c015f2a2936.dll""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\attrib.exeattrib -s -r -h "C:\Users\Admin\AppData\Local\Temp\a2eecf17e60223705e045692e1b84228d3b978300fac235c621a9c015f2a2936.dll"3⤵
- Views/modifies file attributes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\README_TO_DECRYPT.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1460 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5867da2a6c7be48350650f2d907120dd3
SHA109512e5fcba19af0f9dc9cb4dcda51117c323a6b
SHA256a019dbfde02f0a9e9bcbc99b09b27d7b4877bed24bd0219d035e45fd1c09a36d
SHA5129a615ff586fea4f053fa41b3a39b8c79d6d138fc4a53c888ae6705fef21203d5f4287117dbe88c261a1127e6f225538382d31d87f0a3806520744fd9b7792e97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD521b9f7049d0ff79321091f9675ac5704
SHA15e625bc561574dcc4ee1cd8a0f764703fa361cfe
SHA256f393f7282627597427dc917c07b032849e5c0c07a28f2e09d5bd4f54d4e3feeb
SHA512409cc97fff2496ce0f9cc58cece81d2111dbd292ba66875cd9f8489709fe51a0763b7ae3d0096e1728297abc99698af84970036dd8f7210248f1785cd577d1af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD53daf15d2b57d98de6a927dfdb4b99df8
SHA1b59fec04bbe4e59644ef9d920a486b629e1d6360
SHA256a3923e74955ae267447d5184cb1097593f6dfda656da1109c2f2b00b52d40923
SHA5121ac82b957d291719a187347565def5d7bde45b5c70af5f6e54bbea0659d4f5472986bbec95380fffacf77721d635cd3cad5331cde44d81c6500bcb505060b2f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD587928598497246a21f0e2959036f637a
SHA1eabef9d61540e42dec658b8bb231b48ec49d3ee0
SHA2562f5a1658c67a5a7d7becea9f994e8ba356b397aeea1eaec52a7dda7678fd97fe
SHA51231870bd662681a7f77f1b772f59a88f624459593c7c435aa8ac01225ef37fd63513a552ed44730071e97e62e65470783069544fd5f66db547e7a3ca226d00c9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5d980498f1ef29fa866b2f386920e34b8
SHA14114ba33d4e24a744315b96be1e1ec1cb572ff9b
SHA25680604cc1102ea74e1d7570e93edae5587f9da726eee9667d496bcc8aa4b999aa
SHA5125182d3d99bdb64195e690dd30bf83b54dd8d99a08ff81898df74595826d982a360e2bce7c9dcea61947daa8eadb1145bedae04af1a88d3cdd4e5496143518b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b8f6be9dfc799cb75f3d39ac1fdf2302
SHA124199c3ae674f45794c2a8af585983563f032f83
SHA256c8367afa1da9b2714ca7b774c564491498d70628c7f1062e984a9df1e512895a
SHA51298194009ac9247c63d156f91230168d875f0d1146b03bd043ea1bff8601338c823d0aa835551b346d19910e3f35e540971db162b3ff9b6ced3975ba5bbe57302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD507f851d72075c56853551b78d55b9ea8
SHA1fb8781873759663df899c3fdf6a2b2822c9b02c4
SHA2560cf78136049ce740bbe8b224b2b1ecda5169d67e144de901b004843b788cc927
SHA5126526e03387769de2fcb0b0e57e70151d2d9a799935cf9f24920f25bf2a118426527ea50cceed4f8e80edd9f2af28c84e7c191773ad9aff1e8689e6bb56f0df4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5450fd3ef30e5d9fcf47095a13a48fcc6
SHA1dd74b01f60f66e2d9e1b30a4ae9cdccd72f82d69
SHA25633fd127c4623d2a72e37e49197dc145d16cba8c80c543f52886a0ee82a8dd3fc
SHA512e1a1616201771a16546f1fc1c8901810df0a420c7dc6ef24c96ef4dfa24baf77c73aefaa970f3418b53519d463b876c9aea70645b515b883de1cf6ed13f36945
-
C:\Users\Admin\AppData\Local\Temp\006C3B0E.batFilesize
65B
MD5348cae913e496198548854f5ff2f6d1e
SHA1a07655b9020205bd47084afd62a8bb22b48c0cdc
SHA256c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506
SHA512799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611
-
C:\Users\Admin\AppData\Local\Temp\006C3B0E.batFilesize
65B
MD5348cae913e496198548854f5ff2f6d1e
SHA1a07655b9020205bd47084afd62a8bb22b48c0cdc
SHA256c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506
SHA512799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611
-
C:\Users\Admin\AppData\Local\Temp\CabA306.tmpFilesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
C:\Users\Admin\AppData\Local\Temp\TarA404.tmpFilesize
161KB
MD573b4b714b42fc9a6aaefd0ae59adb009
SHA1efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
SHA256c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
SHA51273af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
C:\Users\Admin\Desktop\README_TO_DECRYPT.htmlFilesize
2KB
MD5f46ff2d55c963be6f57a9bc599452c40
SHA1e36db8ed6ef3ddf5ef562c6dc5df148e4f3d1cc7
SHA2567257116268be82e7872963ce983674528a1bee58668dccfc0b8da4811761107b
SHA512caf060973e731c9e2e4a78d86f30d0d3bbbdc68d1f8c9820da79e59dbe3dbf6ff825c8a82c20dec4eb7de2bb8c2be02d3a1c87673312fd13eeef0878c0945273
-
C:\Users\Admin\Desktop\README_TO_DECRYPT.htmlFilesize
2KB
MD5f46ff2d55c963be6f57a9bc599452c40
SHA1e36db8ed6ef3ddf5ef562c6dc5df148e4f3d1cc7
SHA2567257116268be82e7872963ce983674528a1bee58668dccfc0b8da4811761107b
SHA512caf060973e731c9e2e4a78d86f30d0d3bbbdc68d1f8c9820da79e59dbe3dbf6ff825c8a82c20dec4eb7de2bb8c2be02d3a1c87673312fd13eeef0878c0945273
-
memory/1460-331-0x0000000002590000-0x00000000025A0000-memory.dmpFilesize
64KB
-
memory/1528-332-0x0000000000F80000-0x0000000000F82000-memory.dmpFilesize
8KB