Analysis

  • max time kernel
    210s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-06-2023 18:34

General

  • Target

    Fantom.exe

  • Size

    261KB

  • MD5

    7d80230df68ccba871815d68f016c282

  • SHA1

    e10874c6108a26ceedfc84f50881824462b5b6b6

  • SHA256

    f4234a501edcd30d3bc15c983692c9450383b73bdd310059405c5e3a43cc730b

  • SHA512

    64d02b3e7ed82a64aaac1f74c34d6b6e6feaac665ca9c08911b93eddcec66595687024ec576e74ea09a1193ace3923969c75de8733859835fef45335cf265540

  • SSDEEP

    3072:vDKW1LgppLRHMY0TBfJvjcTp5XxG8pt+oSOpE22obq+NYgvPuCEbMBWJxLRiUgV:vDKW1Lgbdl0TBBvjc/M8n35nYgvKjdzi

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\DECRYPT_YOUR_FILES.HTML

Ransom Note
<html> <head> <style> body{ background-color: #3366CC; } h1 { background-color: RGB(249, 201, 16); } p { background-color: maroon; color: white; } </style> </head> <body> <center> <h1><b> Attention ! All your files </b> have been encrypted. </h1></br> <p> Due encrypting was used algoritm RSA-4096 and AES-256, used for protection military secrets.</br> That means > RESTORE YOU DATA POSIBLE ONLY BUYING decryption passwords from us.</br> Getting a decryption of your files is - SIMPLY task.</br></br> That all what you need:</br> 1. Sent Your ID_KEY on mailbox [email protected] or [email protected] </br> 2. For test, decrypt 2 small files, to be sure that we can decrypt you files.</br> 3. Pay our services. </br> 4. GET software with passwords for decrypt you files.</br> 5. Make measures to prevent this type situations again.</br></br> IMPORTANT(1)</br> Do not try restore files without our help, this is useless, and can destroy you data permanetly.</br></br> IMPORTANT(2) </br> We Cant hold you decryption passwords forever. </br>ALL DECRYPTION PASSWORDS, for what wasn`t we receive reward, will destroy after week of moment of encryption. </p> <p> Your ID_KEY: <br> </p> <table width="1024" border="0"> <tbody> <tr> <td><p>CMVvhsrMSuyqN80eo4NEqQkYUJq30ezBU6o9j3ro/xaXHu+x+NfwQdSIUygzsSIscgME4Z92fp3vlwCi7ZMYHmPIDVpiDp0smz+2vxiwN0RQzn2fETJjL+Wm9XSnuZIBrVCm9ANOkFcexInBHemTm9rMWF08iQ+GSkAw0Jrwr4+tNEHYobk91XdRDP+IDiQXNwFdbTYvXHnHahQnsjTl8tVff7ymqpK/XlHAYldl3aIOKXbX+olesH7ed8hQoRsrNSGIrh24Mkb1S67XfiKgtqooK0QwqakPPxfW2ZnR0xA/UIG1lP9/gotrdXyVHF1U8LYr5lTLgIrCC/MBYkXXaQ==ZW4tVVM=</p></td> </tr> </tbody> </table> </center></html></body>

Signatures

  • Fantom

    Ransomware which hides encryption process behind fake Windows Update screen.

  • Renames multiple (1922) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Disables Task Manager via registry modification
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Fantom.exe
    "C:\Users\Admin\AppData\Local\Temp\Fantom.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4532
    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe
      "C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"
      2⤵
      • Executes dropped EXE
      PID:4344

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\Lang\DECRYPT_YOUR_FILES.HTML

    Filesize

    1KB

    MD5

    1569c2fd7935a71db8bd6a2525518fe5

    SHA1

    c2da353665d39091fe112c3a6c06758e9bc1a259

    SHA256

    0183e6fc232a003f89e60f15455a5a6e017afafe061dcb1aa30406164245fd87

    SHA512

    31b8672d20600441ede8e5346b093047f0bdb7c33bc1aa9a168805f2e2fe5fb1d7a7e2236133e9f1c12a5a1b2b429bb7f1d40e59ee8d9a5146049bbb8f8c51f9

  • C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\win32_LinkNoDrop32x32.gif

    Filesize

    160B

    MD5

    9c3052041770308deeba88dd724118d9

    SHA1

    f89e1c63775999f331822b15a1dda5f51d5ba0ca

    SHA256

    fabb1ab358c566d5b56d57c86df06c41e3facc0239048a5b1352d45d97f3fe61

    SHA512

    b814c68cfa3eae148647b6f6b632dc94ce951fac606bc762d96c885494f93612b1dc0f3eb11e77d06c54ed6ca2c46716f2bbc2884f5c5909899468ac4f531783

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html

    Filesize

    12KB

    MD5

    e2f6f23662f59743a4d684653c3e45f6

    SHA1

    a35100e3b054d614c3e3bef4e0f57e48dfa8e6a4

    SHA256

    96047df3c30425c0ddd142df1daef4460de743f2a47ea76d34ad6eaf5b9991cb

    SHA512

    04c9e326158575870d5bb58c18ce54bfbf152dc812a8cb44e8c5b8a09840dd469314f1a827811d8f86bdec3b657b6f2bc6eb037eecd7aa123b24c8b60f1f9903

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html

    Filesize

    8KB

    MD5

    c76115a477788da17658df1ad078dcd5

    SHA1

    c3af5a799bb0f4935c994f1d6e4ebe6b1c947409

    SHA256

    07ef264805ec989f92d4451d09256296da5faaac6af15368fedc8cfb3718a6ae

    SHA512

    d6bb7ecc720f87072ec05cdaf56ae3ada029ec4a852dbb4eb013f80a5315ddc5c0be5abc3abc6da27550f00b2406b2690640d2a4bf5da148ba6411d9a95741a8

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

    Filesize

    11KB

    MD5

    f3347ee2bdc3cff564068a404059ad42

    SHA1

    a9e833c8b4e34336bb280a323b1a6843d02c1961

    SHA256

    cae7f83297beb5df2a4ca80b7e1033ce86bf23a0e4f244889a96060113308e7f

    SHA512

    a3c47b230e4095b894554bd134bf8c4fca18c1180f56e494d3c62dcfa0d0e0823a8d503a80f31450f2caaf9bcf627d53f047829390b288594c5271b371e23c9a

  • C:\Program Files\Java\jre1.8.0_66\THIRDPARTYLICENSEREADME-JAVAFX.txt

    Filesize

    107KB

    MD5

    48c30e127d3fee8e994b9b80584c4d41

    SHA1

    f61db30b18c8f03b8d7c9e3b10e88b7f85af2f35

    SHA256

    e8dced2b194b1e7e6302c523c49728f3015008b29bd8668df2c2e5f0217b8db9

    SHA512

    16ca12e844e9bc52187e285188c09e6112bf2246c0dd9a437ce1f17c2d30d3ece9f8374ce0140d81519eb4f1f7272e3adfc87a6a84b978153417fd3a96d2e56b

  • C:\Program Files\Java\jre1.8.0_66\THIRDPARTYLICENSEREADME.txt

    Filesize

    172KB

    MD5

    8d7f67610a4c986acf2a588f8aaf6bf6

    SHA1

    bf87b294fe0fa349d4a78c2b70e028f4e41457a5

    SHA256

    aab1526fd03038afff109526004fef5bd53a62ab0bb56d17f0a7b89191889836

    SHA512

    babd64a5a7fad30223cd34997d592f3230cac93cbc5c0e60771e11670423cdfadf6ea5dc0eb8b2d49e3132a449e99c6988c66e660203ebba4e646f61ae406f39

  • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

    Filesize

    48B

    MD5

    487a9fdf6d3d6d410300a940cd48f0e4

    SHA1

    680d11741403d9aeb6b5e92c8bc2548f21d83595

    SHA256

    79a0b78fc389fb17c8c1bfd1f9d21b2dac91625134d28c743125e5b7ec084924

    SHA512

    35bcf3df8cff3ee5b0c109fd074e9554bdabfc2a843503840ba1ba0c23c210ece021aeacd8082c031a6b346ed503db4089d593214e5547d18d53d40962bac54c

  • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe

    Filesize

    21KB

    MD5

    fec89e9d2784b4c015fed6f5ae558e08

    SHA1

    581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2

    SHA256

    489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065

    SHA512

    e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24

  • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe

    Filesize

    21KB

    MD5

    fec89e9d2784b4c015fed6f5ae558e08

    SHA1

    581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2

    SHA256

    489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065

    SHA512

    e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24

  • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe

    Filesize

    21KB

    MD5

    fec89e9d2784b4c015fed6f5ae558e08

    SHA1

    581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2

    SHA256

    489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065

    SHA512

    e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24

  • memory/4344-289-0x000000001B660000-0x000000001B670000-memory.dmp

    Filesize

    64KB

  • memory/4344-280-0x0000000000950000-0x000000000095C000-memory.dmp

    Filesize

    48KB

  • memory/4344-670-0x000000001B660000-0x000000001B670000-memory.dmp

    Filesize

    64KB

  • memory/4532-175-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-193-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-151-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-153-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-155-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-157-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-159-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-161-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-163-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-167-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-169-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-165-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-171-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-173-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-147-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-177-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-179-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-181-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-183-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-185-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-187-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-189-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-191-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-149-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-195-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-197-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-199-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-260-0x0000000004C00000-0x00000000051A4000-memory.dmp

    Filesize

    5.6MB

  • memory/4532-261-0x0000000004B40000-0x0000000004BD2000-memory.dmp

    Filesize

    584KB

  • memory/4532-262-0x0000000005320000-0x000000000532A000-memory.dmp

    Filesize

    40KB

  • memory/4532-263-0x0000000004BF0000-0x0000000004C00000-memory.dmp

    Filesize

    64KB

  • memory/4532-145-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-143-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-141-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-139-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-137-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-136-0x0000000002570000-0x000000000259B000-memory.dmp

    Filesize

    172KB

  • memory/4532-135-0x0000000004BF0000-0x0000000004C00000-memory.dmp

    Filesize

    64KB

  • memory/4532-134-0x0000000004BF0000-0x0000000004C00000-memory.dmp

    Filesize

    64KB

  • memory/4532-133-0x0000000004BF0000-0x0000000004C00000-memory.dmp

    Filesize

    64KB

  • memory/4532-264-0x0000000004AC0000-0x0000000004AC1000-memory.dmp

    Filesize

    4KB

  • memory/4532-265-0x0000000004BF0000-0x0000000004C00000-memory.dmp

    Filesize

    64KB

  • memory/4532-266-0x0000000004BF0000-0x0000000004C00000-memory.dmp

    Filesize

    64KB

  • memory/4532-267-0x0000000004BF0000-0x0000000004C00000-memory.dmp

    Filesize

    64KB

  • memory/4532-268-0x0000000004BF0000-0x0000000004C00000-memory.dmp

    Filesize

    64KB