Analysis
-
max time kernel
32s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-03-2023 15:28
Static task
static1
Behavioral task
behavioral1
Sample
6606dac5b89e76be4d85a85bdd8cb5f6c13c0fc887a3c0072d064713932a23f4.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6606dac5b89e76be4d85a85bdd8cb5f6c13c0fc887a3c0072d064713932a23f4.dll
Resource
win10v2004-20230220-en
General
-
Target
6606dac5b89e76be4d85a85bdd8cb5f6c13c0fc887a3c0072d064713932a23f4.dll
-
Size
365KB
-
MD5
4401c2782092881cd54018f1381b1521
-
SHA1
8e96e2c9f1ade2a762c839e5dd6d2c6beb576363
-
SHA256
6606dac5b89e76be4d85a85bdd8cb5f6c13c0fc887a3c0072d064713932a23f4
-
SHA512
4c383a6901ba719fd15d56ba6b40f1cd0dc5f2e20eae9cadd2d477f8f16262a0f8fca3a4ca20227a02d5eb086a774ba0783b3dcaf019bbe09ff21a3182b2b0d9
-
SSDEEP
6144:Rtht/U8T6AOHdt8lIJASVO30UFimXNxtipVO30UFimXNxtiH:/wValD/30Wietia30Wieti
Malware Config
Extracted
C:\Users\Admin\Desktop\README_TO_DECRYPT.html
quantum
Extracted
C:\Users\Admin\Desktop\README_TO_DECRYPT.html
quantum
http://obqregdsd7dmilzf3aqvegn3sofpufsvb2n3m2dvwfhsgthemvyi44qd.onion/?cid=207aa5c60e08117ba86c113b3ff9e298793ac3be13c0a67e799ece0677a89f65
Signatures
-
Quantum Ransomware
A rebrand of the MountLocker ransomware first seen in August 2021.
-
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification \??\c:\Users\Admin\Pictures\ShowCheckpoint.tiff rundll32.exe File renamed C:\Users\Admin\Pictures\ShowCheckpoint.tiff => \??\c:\Users\Admin\Pictures\ShowCheckpoint.tiff.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\SkipDeny.raw => \??\c:\Users\Admin\Pictures\SkipDeny.raw.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\StartMove.raw => \??\c:\Users\Admin\Pictures\StartMove.raw.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\UpdateInstall.tif => \??\c:\Users\Admin\Pictures\UpdateInstall.tif.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\DisconnectEnter.png => \??\c:\Users\Admin\Pictures\DisconnectEnter.png.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\EnterSwitch.raw => \??\c:\Users\Admin\Pictures\EnterSwitch.raw.quantum rundll32.exe File renamed C:\Users\Admin\Pictures\JoinEnter.raw => \??\c:\Users\Admin\Pictures\JoinEnter.raw.quantum rundll32.exe -
Deletes itself 1 IoCs
pid Process 1584 cmd.exe -
Drops desktop.ini file(s) 26 IoCs
description ioc Process File opened for modification \??\c:\Users\Admin\Favorites\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Favorites\Links for United States\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Music\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Searches\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Music\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Pictures\Sample Pictures\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Recorded TV\Sample Media\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Desktop\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Desktop\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Libraries\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Music\Sample Music\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Pictures\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Videos\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Favorites\Links\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Downloads\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Links\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Saved Games\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Videos\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Documents\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Recorded TV\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Contacts\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Videos\Sample Videos\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Pictures\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Public\Downloads\desktop.ini rundll32.exe File opened for modification \??\c:\Users\Admin\Documents\desktop.ini rundll32.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{19429051-B84E-11ED-B5F0-D28FF4BEF639} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\.quantum\shell\Open\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\.quantum rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\.quantum\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\.quantum\shell\Open rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\.quantum\shell\Open\command\ = "explorer.exe README_TO_DECRYPT.html" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2040 rundll32.exe 2040 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2040 rundll32.exe Token: SeDebugPrivilege 2040 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 852 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 852 iexplore.exe 852 iexplore.exe 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1584 2040 rundll32.exe 29 PID 2040 wrote to memory of 1584 2040 rundll32.exe 29 PID 2040 wrote to memory of 1584 2040 rundll32.exe 29 PID 1584 wrote to memory of 1452 1584 cmd.exe 31 PID 1584 wrote to memory of 1452 1584 cmd.exe 31 PID 1584 wrote to memory of 1452 1584 cmd.exe 31 PID 852 wrote to memory of 1564 852 iexplore.exe 34 PID 852 wrote to memory of 1564 852 iexplore.exe 34 PID 852 wrote to memory of 1564 852 iexplore.exe 34 PID 852 wrote to memory of 1564 852 iexplore.exe 34 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1452 attrib.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6606dac5b89e76be4d85a85bdd8cb5f6c13c0fc887a3c0072d064713932a23f4.dll,#11⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\\006C3064.bat" """2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\system32\attrib.exeattrib -s -r -h ""3⤵
- Views/modifies file attributes
PID:1452
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\README_TO_DECRYPT.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:852 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1564
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5a746d0454a0b87fb56e67573bda62b9d
SHA15313164c4a72f6a90bc16c5f7554750be82365e5
SHA25699b53a6d73c0c547ff1eb57751bd3852d20faa0aab7340f48aae6a404b9f4563
SHA512f4e59d9b732debf646dd5c7cf3fa73802b3abc218d3f84d63c020c530c1a3f0337cb35d24fec6b553890764d64f53fd0b694729c41901cea6920ee0d75fb7759
-
Filesize
65B
MD5348cae913e496198548854f5ff2f6d1e
SHA1a07655b9020205bd47084afd62a8bb22b48c0cdc
SHA256c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506
SHA512799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611
-
Filesize
65B
MD5348cae913e496198548854f5ff2f6d1e
SHA1a07655b9020205bd47084afd62a8bb22b48c0cdc
SHA256c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506
SHA512799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611
-
Filesize
2KB
MD586962a3ca9fb4b8c5a05ad4aef647aea
SHA18dc61c86c1d149d5feaf1cff0991d4f8ef17bf00
SHA25602b2ca6651c08c41209c1920b1a5583274414642bf6b5d9cf9435952e508c1fc
SHA512f7f71dda0a3f4c7611bb5e8e0cb6897d748c11463745fee479748f2c8af90570314279205961619e20d060c77aca5cfb915aeba095fed8d8bcc18d6e1b30fcb3
-
Filesize
2KB
MD586962a3ca9fb4b8c5a05ad4aef647aea
SHA18dc61c86c1d149d5feaf1cff0991d4f8ef17bf00
SHA25602b2ca6651c08c41209c1920b1a5583274414642bf6b5d9cf9435952e508c1fc
SHA512f7f71dda0a3f4c7611bb5e8e0cb6897d748c11463745fee479748f2c8af90570314279205961619e20d060c77aca5cfb915aeba095fed8d8bcc18d6e1b30fcb3