Analysis
-
max time kernel
38s -
max time network
40s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28-02-2023 04:17
Static task
static1
Behavioral task
behavioral1
Sample
8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe
Resource
win10v2004-20230220-en
General
-
Target
8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe
-
Size
75KB
-
MD5
108b36a8250f1bb1d600d5d02106898c
-
SHA1
6ca6566d0a6db3fae9a63d68e7fb7819a098d3d6
-
SHA256
8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8
-
SHA512
8331edf61ed1d29c4eab2f283e8992e894863be5e327b35d4fe5d2a084e465b34c672f6c1a7e52ea12babce0f2328e7b56f68a51442375d3f3be1c56839225cb
-
SSDEEP
1536:9aX51pVH9hsgNGLs6BLM1frxz/HTfcKKBaJGrSLYc:OfJGLs6BwNxnfTKsG8Y
Malware Config
Extracted
C:\Users\Admin\Desktop\README_TO_DECRYPT.html
Signatures
-
Quantum Ransomware
A rebrand of the MountLocker ransomware first seen in August 2021.
-
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\UninstallMerge.raw => \??\c:\Users\Admin\Pictures\UninstallMerge.raw.quantum 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File renamed C:\Users\Admin\Pictures\CopyFormat.crw => \??\c:\Users\Admin\Pictures\CopyFormat.crw.quantum 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File renamed C:\Users\Admin\Pictures\HideNew.raw => \??\c:\Users\Admin\Pictures\HideNew.raw.quantum 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Admin\Pictures\SyncPush.tiff 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File renamed C:\Users\Admin\Pictures\SyncPush.tiff => \??\c:\Users\Admin\Pictures\SyncPush.tiff.quantum 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe -
Deletes itself 1 IoCs
pid Process 1140 cmd.exe -
Drops desktop.ini file(s) 26 IoCs
description ioc Process File opened for modification \??\c:\Users\Admin\Desktop\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Admin\Downloads\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Admin\Favorites\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Admin\Favorites\Links\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Admin\Music\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Admin\Pictures\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Admin\Searches\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Public\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Public\Downloads\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Public\Pictures\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Public\Recorded TV\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Public\Recorded TV\Sample Media\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Admin\Links\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Admin\Saved Games\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Public\Music\Sample Music\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Admin\Documents\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Admin\Videos\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Public\Videos\Sample Videos\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Admin\Contacts\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Admin\Favorites\Links for United States\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Public\Desktop\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Public\Documents\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Public\Libraries\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Public\Music\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Public\Pictures\Sample Pictures\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe File opened for modification \??\c:\Users\Public\Videos\desktop.ini 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E597331-B727-11ED-A077-DE010D53120A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\.quantum\shell\Open\command 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\.quantum 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\.quantum\shell 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\.quantum\shell\Open 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\.quantum\shell\Open\command\ = "explorer.exe README_TO_DECRYPT.html" 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2036 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe 2036 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2036 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe Token: SeDebugPrivilege 2036 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1648 iexplore.exe 1648 iexplore.exe 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1140 2036 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe 29 PID 2036 wrote to memory of 1140 2036 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe 29 PID 2036 wrote to memory of 1140 2036 8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe 29 PID 1140 wrote to memory of 736 1140 cmd.exe 31 PID 1140 wrote to memory of 736 1140 cmd.exe 31 PID 1140 wrote to memory of 736 1140 cmd.exe 31 PID 1648 wrote to memory of 1984 1648 iexplore.exe 34 PID 1648 wrote to memory of 1984 1648 iexplore.exe 34 PID 1648 wrote to memory of 1984 1648 iexplore.exe 34 PID 1648 wrote to memory of 1984 1648 iexplore.exe 34 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 736 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe"C:\Users\Admin\AppData\Local\Temp\8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\\006C2F5B.bat" "C:\Users\Admin\AppData\Local\Temp\8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\system32\attrib.exeattrib -s -r -h "C:\Users\Admin\AppData\Local\Temp\8458e0c8dedee593b99025ec99ad7fa692b3302e5e2aa243920dd434b732c2b8.exe"3⤵
- Views/modifies file attributes
PID:736
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\README_TO_DECRYPT.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1648 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1984
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65B
MD5348cae913e496198548854f5ff2f6d1e
SHA1a07655b9020205bd47084afd62a8bb22b48c0cdc
SHA256c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506
SHA512799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611
-
Filesize
65B
MD5348cae913e496198548854f5ff2f6d1e
SHA1a07655b9020205bd47084afd62a8bb22b48c0cdc
SHA256c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506
SHA512799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
161KB
MD573b4b714b42fc9a6aaefd0ae59adb009
SHA1efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
SHA256c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
SHA51273af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
Filesize
7KB
MD50dbab907f708365c408acdf1fffc9a41
SHA16367310ed51d5fd3fc36f85d5ffa3d04466586ac
SHA2568469c9938cc93d67a91e7ead03a7e7df587a8c36fcfe02fb8b405a8a703394a1
SHA51283e9f91143ad91797cbca2f48ddda8bc07c72e2ad24d7f6345ef3ce337839419e6f276ea954ed7b9c9b6b780ea16b3b29ed267faf02fc718a5421447284124ca
-
Filesize
7KB
MD50dbab907f708365c408acdf1fffc9a41
SHA16367310ed51d5fd3fc36f85d5ffa3d04466586ac
SHA2568469c9938cc93d67a91e7ead03a7e7df587a8c36fcfe02fb8b405a8a703394a1
SHA51283e9f91143ad91797cbca2f48ddda8bc07c72e2ad24d7f6345ef3ce337839419e6f276ea954ed7b9c9b6b780ea16b3b29ed267faf02fc718a5421447284124ca