Analysis

  • max time kernel
    54s
  • max time network
    58s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    28-02-2023 03:46

General

  • Target

    53d6ddd82fc6faa5549fb887bbcad87759d93ee27c12a3cac74637d6e881dc08.exe

  • Size

    64KB

  • MD5

    60c02f5b6c8cf50918027e14bf06b967

  • SHA1

    3c9e9454ed02c02ccfc3f5240391c413da300b5f

  • SHA256

    53d6ddd82fc6faa5549fb887bbcad87759d93ee27c12a3cac74637d6e881dc08

  • SHA512

    c7f893883406065c78474af4541178bffec10f4a9847e15206c4012e68c87228029bc495fefb2ebdab77b16595d1969b8d85674b02a1c49f3f61b2281e39aa4f

  • SSDEEP

    768:GnJ9uwtbJD/QpEdTrArzVpCK1w22TYgNvCJ037FLxZKQJRNz0TqXuEmLIu0L:G+wr1AB0AwB57F9npz0TauEm8u0L

Score
10/10

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\README_TO_DECRYPT.html

Family

quantum

Ransom Note
<html> <head> <title>Quantum</title> </head> <body> <h1>Your ID:</h1> <b> <pre> 8c2f9a2309b489e5a3f2b753b653456861d985722897b67542bbdd1149822732 </pre> </b> <hr/> This message contains an information how to fix the troubles you've got with your network.<br><br> Files on the workstations in your network were encrypted and any your attempt to change, decrypt or rename them could destroy the content.<br> The only way to get files back is a decryption with Key, provided by the Quantum Locker.<br><br> During the period your network was under our control, we downloaded a huge volume of information.<br> Now it is stored on our servers with high-secure access. This information contains a lot of sensitive, private and personal data.<br> Publishing of such data will cause serious consequences and even business disruption.<br><br> It's not a threat, on the contrary - it's a manual how to get a way out.<br> Quantum team doesn't aim to damage your company, our goals are only financial.<br><br> After a payment you'll get network decryption, full destruction of downloaded data, information about your network vulnerabilities and penetration points.<br> If you decide not to negotiate, in 48 hours the fact of the attack and all your information will be posted on our site and will be promoted among dozens of cyber forums, news agencies, websites etc.<br><br> To contact our support and start the negotiations, please visit our support chat.<br> It is simple, secure and you can set a password to avoid intervention of unauthorised persons.<br> <a href="http://wxxp3rny7w3j6gkel56iomdw2ztfzqxlsdw3fyezrnohgh767bau6dqd.onion/?cid=8c2f9a2309b489e5a3f2b753b653456861d985722897b67542bbdd1149822732">http://wxxp3rny7w3j6gkel56iomdw2ztfzqxlsdw3fyezrnohgh767bau6dqd.onion/?cid=8c2f9a2309b489e5a3f2b753b653456861d985722897b67542bbdd1149822732</a> <ul> <li>Password field should be blank for the first login. <li>Note that this server is available via Tor browser only. </ul> P.S. How to get TOR browser - see at https://www.torproject.org </body> </html>

Extracted

Path

C:\Users\Admin\Desktop\README_TO_DECRYPT.html

Family

quantum

Ransom Note
Your ID: This message contains an information how to fix the troubles you've got with your network. Files on the workstations in your network were encrypted and any your attempt to change, decrypt or rename them could destroy the content. The only way to get files back is a decryption with Key, provided by the Quantum Locker. During the period your network was under our control, we downloaded a huge volume of information. Now it is stored on our servers with high-secure access. This information contains a lot of sensitive, private and personal data. Publishing of such data will cause serious consequences and even business disruption. It's not a threat, on the contrary - it's a manual how to get a way out. Quantum team doesn't aim to damage your company, our goals are only financial. After a payment you'll get network decryption, full destruction of downloaded data, information about your network vulnerabilities and penetration points. If you decide not to negotiate, in 48 hours the fact of the attack and all your information will be posted on our site and will be promoted among dozens of cyber forums, news agencies, websites etc. To contact our support and start the negotiations, please visit our support chat. It is simple, secure and you can set a password to avoid intervention of unauthorised persons. http://wxxp3rny7w3j6gkel56iomdw2ztfzqxlsdw3fyezrnohgh767bau6dqd.onion/?cid=8c2f9a2309b489e5a3f2b753b653456861d985722897b67542bbdd1149822732 Password field should be blank for the first login. Note that this server is available via Tor browser only. P.S. How to get TOR browser - see at https://www.torproject.org
URLs

http://wxxp3rny7w3j6gkel56iomdw2ztfzqxlsdw3fyezrnohgh767bau6dqd.onion/?cid=8c2f9a2309b489e5a3f2b753b653456861d985722897b67542bbdd1149822732

Signatures

  • Quantum Ransomware

    A rebrand of the MountLocker ransomware first seen in August 2021.

  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Deletes itself 1 IoCs
  • Drops desktop.ini file(s) 26 IoCs
  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53d6ddd82fc6faa5549fb887bbcad87759d93ee27c12a3cac74637d6e881dc08.exe
    "C:\Users\Admin\AppData\Local\Temp\53d6ddd82fc6faa5549fb887bbcad87759d93ee27c12a3cac74637d6e881dc08.exe"
    1⤵
    • Modifies extensions of user files
    • Drops desktop.ini file(s)
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\\006C60D6.bat" "C:\Users\Admin\AppData\Local\Temp\53d6ddd82fc6faa5549fb887bbcad87759d93ee27c12a3cac74637d6e881dc08.exe""
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1576
      • C:\Windows\SysWOW64\attrib.exe
        attrib -s -r -h "C:\Users\Admin\AppData\Local\Temp\53d6ddd82fc6faa5549fb887bbcad87759d93ee27c12a3cac74637d6e881dc08.exe"
        3⤵
        • Views/modifies file attributes
        PID:1636
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\README_TO_DECRYPT.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:544
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:544 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1100

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\006C60D6.bat

    Filesize

    65B

    MD5

    348cae913e496198548854f5ff2f6d1e

    SHA1

    a07655b9020205bd47084afd62a8bb22b48c0cdc

    SHA256

    c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506

    SHA512

    799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611

  • C:\Users\Admin\AppData\Local\Temp\006C60D6.bat

    Filesize

    65B

    MD5

    348cae913e496198548854f5ff2f6d1e

    SHA1

    a07655b9020205bd47084afd62a8bb22b48c0cdc

    SHA256

    c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506

    SHA512

    799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611

  • C:\Users\Admin\Desktop\README_TO_DECRYPT.html

    Filesize

    2KB

    MD5

    80a27365f722f99f1bcb2a9e60a0102d

    SHA1

    3b0a2f48a358b0947a5faaf15556dede922c9571

    SHA256

    e8224663a7feb247de2310007809d22ab9d42fd1de381f95ce3e2cb56215b98e

    SHA512

    7947f3f3ed7ea9b631746d3ebbf0751a144628e387360d6b6bb8571d826cafa306f6154fcfe9c79d3299195f7b2250b28e300db7acd186eac404d15827a92770

  • C:\Users\Admin\Desktop\README_TO_DECRYPT.html

    Filesize

    2KB

    MD5

    80a27365f722f99f1bcb2a9e60a0102d

    SHA1

    3b0a2f48a358b0947a5faaf15556dede922c9571

    SHA256

    e8224663a7feb247de2310007809d22ab9d42fd1de381f95ce3e2cb56215b98e

    SHA512

    7947f3f3ed7ea9b631746d3ebbf0751a144628e387360d6b6bb8571d826cafa306f6154fcfe9c79d3299195f7b2250b28e300db7acd186eac404d15827a92770

  • memory/544-327-0x0000000002DE0000-0x0000000002DF0000-memory.dmp

    Filesize

    64KB

  • memory/1100-328-0x0000000002F30000-0x0000000002F32000-memory.dmp

    Filesize

    8KB