Analysis
-
max time kernel
42s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28-02-2023 02:39
Static task
static1
Behavioral task
behavioral1
Sample
e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe
Resource
win10v2004-20230220-en
General
-
Target
e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe
-
Size
75KB
-
MD5
0ea7b7b9e3c9327600e5f6c3d73d3b31
-
SHA1
0e9fa74e170d65cfd2c30dbb97e15ec5d5101d2d
-
SHA256
e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199
-
SHA512
ffceee9d663a38c9ec163b3e175d84133f876eb238bff9b7e63deccf661807166900f7e12154db56554e234fb97ff5eed9cd7e3677923669b6449c8f3a881492
-
SSDEEP
768:FbzkUtPX9DUetap1YOc8tmmSuDsCHJexou+nPp18vjILhussGdamRv5qmppQHUdZ:SaX1LGfDpRRuI0PuvtOuSG4PA
Malware Config
Extracted
C:\Users\Admin\Desktop\README_TO_DECRYPT.html
quantum
Extracted
C:\Users\Admin\Desktop\README_TO_DECRYPT.html
quantum
http://kcbyz2zmg3kmtmoyrleznkcypippxn2pvknunqdytr5wi6io7pzwleid.onion/?cid=ed0ee7039edd00c28a291fcf647e7ab23181bc0f94b4780ab6db7fe3d303a660
Signatures
-
Quantum Ransomware
A rebrand of the MountLocker ransomware first seen in August 2021.
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exedescription ioc Process File renamed C:\Users\Admin\Pictures\SwitchTrace.raw => \??\c:\Users\Admin\Pictures\SwitchTrace.raw.quantum e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File renamed C:\Users\Admin\Pictures\WaitHide.crw => \??\c:\Users\Admin\Pictures\WaitHide.crw.quantum e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File renamed C:\Users\Admin\Pictures\ExpandWrite.crw => \??\c:\Users\Admin\Pictures\ExpandWrite.crw.quantum e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File renamed C:\Users\Admin\Pictures\MountInitialize.tif => \??\c:\Users\Admin\Pictures\MountInitialize.tif.quantum e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1924 cmd.exe -
Drops desktop.ini file(s) 26 IoCs
Processes:
e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exedescription ioc Process File opened for modification \??\c:\Users\Admin\Favorites\Links for United States\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Admin\Searches\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Public\Downloads\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Admin\Contacts\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Admin\Downloads\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Admin\Saved Games\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Public\Documents\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Public\Music\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Public\Music\Sample Music\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Public\Pictures\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Public\Videos\Sample Videos\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Admin\Favorites\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Admin\Pictures\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Admin\Videos\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Public\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Public\Pictures\Sample Pictures\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Public\Recorded TV\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Public\Recorded TV\Sample Media\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Public\Videos\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Admin\Desktop\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Admin\Documents\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Admin\Music\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Public\Desktop\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Public\Libraries\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Admin\Favorites\Links\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe File opened for modification \??\c:\Users\Admin\Links\desktop.ini e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A3CBA8A1-B719-11ED-AE25-CED2106B5FC8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Modifies registry class 5 IoCs
Processes:
e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000_CLASSES\.quantum\shell\Open\command e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000_CLASSES\.quantum e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000_CLASSES\.quantum\shell e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000_CLASSES\.quantum\shell\Open e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000_CLASSES\.quantum\shell\Open\command\ = "explorer.exe README_TO_DECRYPT.html" e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exepid Process 1568 e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe 1568 e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exedescription pid Process Token: SeRestorePrivilege 1568 e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe Token: SeDebugPrivilege 1568 e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid Process 1168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid Process 1168 iexplore.exe 1168 iexplore.exe 296 IEXPLORE.EXE 296 IEXPLORE.EXE 296 IEXPLORE.EXE 296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.execmd.exeiexplore.exedescription pid Process procid_target PID 1568 wrote to memory of 1924 1568 e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe 29 PID 1568 wrote to memory of 1924 1568 e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe 29 PID 1568 wrote to memory of 1924 1568 e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe 29 PID 1924 wrote to memory of 1680 1924 cmd.exe 31 PID 1924 wrote to memory of 1680 1924 cmd.exe 31 PID 1924 wrote to memory of 1680 1924 cmd.exe 31 PID 1168 wrote to memory of 296 1168 iexplore.exe 34 PID 1168 wrote to memory of 296 1168 iexplore.exe 34 PID 1168 wrote to memory of 296 1168 iexplore.exe 34 PID 1168 wrote to memory of 296 1168 iexplore.exe 34 -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe"C:\Users\Admin\AppData\Local\Temp\e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\\006C2A0E.bat" "C:\Users\Admin\AppData\Local\Temp\e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\system32\attrib.exeattrib -s -r -h "C:\Users\Admin\AppData\Local\Temp\e2023e1b27adb44333b4f016a9e105625734e3040207aef0fd13f70aa12c4199.exe"3⤵
- Views/modifies file attributes
PID:1680
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\README_TO_DECRYPT.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:296
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65B
MD5348cae913e496198548854f5ff2f6d1e
SHA1a07655b9020205bd47084afd62a8bb22b48c0cdc
SHA256c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506
SHA512799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611
-
Filesize
65B
MD5348cae913e496198548854f5ff2f6d1e
SHA1a07655b9020205bd47084afd62a8bb22b48c0cdc
SHA256c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506
SHA512799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611
-
Filesize
2KB
MD57c3f07e8891497e40f8bedb8a0f5d5ae
SHA1d3ae0ca8255928296dbeec3ca4884ae7afbea733
SHA256afec47710ac52e7020d283aa026dbab118f0412a7ee85597dc2439abe94e1c9c
SHA512374b506dacd5bd03075e473783635d4786f6b0750d187a009e8a3e6c46df7e2d811281ef4d9a76df0f7ca692905c0e94dce6b49521f39152eb7fc97698a92fd6
-
Filesize
2KB
MD57c3f07e8891497e40f8bedb8a0f5d5ae
SHA1d3ae0ca8255928296dbeec3ca4884ae7afbea733
SHA256afec47710ac52e7020d283aa026dbab118f0412a7ee85597dc2439abe94e1c9c
SHA512374b506dacd5bd03075e473783635d4786f6b0750d187a009e8a3e6c46df7e2d811281ef4d9a76df0f7ca692905c0e94dce6b49521f39152eb7fc97698a92fd6