Analysis

  • max time kernel
    210s
  • max time network
    208s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-06-2023 17:54

General

  • Target

    Fantom.exe

  • Size

    261KB

  • MD5

    7d80230df68ccba871815d68f016c282

  • SHA1

    e10874c6108a26ceedfc84f50881824462b5b6b6

  • SHA256

    f4234a501edcd30d3bc15c983692c9450383b73bdd310059405c5e3a43cc730b

  • SHA512

    64d02b3e7ed82a64aaac1f74c34d6b6e6feaac665ca9c08911b93eddcec66595687024ec576e74ea09a1193ace3923969c75de8733859835fef45335cf265540

  • SSDEEP

    3072:vDKW1LgppLRHMY0TBfJvjcTp5XxG8pt+oSOpE22obq+NYgvPuCEbMBWJxLRiUgV:vDKW1Lgbdl0TBBvjc/M8n35nYgvKjdzi

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\DECRYPT_YOUR_FILES.HTML

Ransom Note
<html> <head> <style> body{ background-color: #3366CC; } h1 { background-color: RGB(249, 201, 16); } p { background-color: maroon; color: white; } </style> </head> <body> <center> <h1><b> Attention ! All your files </b> have been encrypted. </h1></br> <p> Due encrypting was used algoritm RSA-4096 and AES-256, used for protection military secrets.</br> That means > RESTORE YOU DATA POSIBLE ONLY BUYING decryption passwords from us.</br> Getting a decryption of your files is - SIMPLY task.</br></br> That all what you need:</br> 1. Sent Your ID_KEY on mailbox [email protected] or [email protected] </br> 2. For test, decrypt 2 small files, to be sure that we can decrypt you files.</br> 3. Pay our services. </br> 4. GET software with passwords for decrypt you files.</br> 5. Make measures to prevent this type situations again.</br></br> IMPORTANT(1)</br> Do not try restore files without our help, this is useless, and can destroy you data permanetly.</br></br> IMPORTANT(2) </br> We Cant hold you decryption passwords forever. </br>ALL DECRYPTION PASSWORDS, for what wasn`t we receive reward, will destroy after week of moment of encryption. </p> <p> Your ID_KEY: <br> </p> <table width="1024" border="0"> <tbody> <tr> <td><p>p1qW3ofmpT7SNpmlD1uf+TE9rTImgz4cSv8d8cXCYc39+BjgSyBf855j2vpZpdaP4OMN95SUMLgmzzdatzmrlwzMjli5brMuFkGDoAKlrilkxjym4KD9Ssk/HHM/BnExXMZXQZzWlFDCUbFeKx7zspk41yo1KdQ5IOGf+5RAJimlsIX05bTFp8LJXoaARskeoMAzcF1j7bDO59C4FaR5uAXQkdtH5+Znhpfk15U5ytWOfRF1LRtrGxRCn5dHXxX8yE0YXztr/pXCV0438I9NoPkKLcks9pcAaYZK1vN/e1MBfN7X5GbNbkGUl4TLaRTdQhOQ9PQU6mmU8wQzmdmSXA==ZW4tVVM=</p></td> </tr> </tbody> </table> </center></html></body>

Signatures

  • Fantom

    Ransomware which hides encryption process behind fake Windows Update screen.

  • Renames multiple (1916) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Disables Task Manager via registry modification
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Fantom.exe
    "C:\Users\Admin\AppData\Local\Temp\Fantom.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe
      "C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"
      2⤵
      • Executes dropped EXE
      PID:4048

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\Lang\DECRYPT_YOUR_FILES.HTML

    Filesize

    1KB

    MD5

    06db2509ec2b267ff33f52dfab5693e2

    SHA1

    33becd7d900e795ce94b4ce51269a761aae9ab64

    SHA256

    6c5f06caecdff0c462144f3cb8e99591a75778a6a1aa6ff0defb655868ff741f

    SHA512

    dd4a11156db5d1505810be97c996546c7c02c5646db406bd9c4668e60627012568742267349ba947c52104dc16775fae20eba33e034e4e6ada258a313dc9dda0

  • C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\win32_LinkNoDrop32x32.gif

    Filesize

    160B

    MD5

    1f4ffe4ac761468fa090007dadd99a8d

    SHA1

    7c1fddb517e32d228f7c672ff1fabb4763e544b8

    SHA256

    e97632a10d3278d3d9edabd302ab77baa586834b8363b8ba03e99b9e44f941a7

    SHA512

    40e9df58cdcf25ffdd84c6959c1d819226bb91743e0891722d6daf567f3bbddd60c346bd413bf7ebaa47d2dca0406db0e69c021293ab612d20a738222c51952f

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html

    Filesize

    12KB

    MD5

    7bc88c0ac4441bf66782810bc7085322

    SHA1

    a93d74ce5737387bb9d827c8b62961fa288fcec7

    SHA256

    63457607ef93785d17b79d6e5d1b368b096d9a9bdb4ccaba5174aea751de57cc

    SHA512

    78a0d450a1b4ccb62f353ca50a114e57101641b4a086cfb317ba64cfbd066beef705c0028590f623144a85d44f70d26e7969cd7b91422f5f0241cf05070c7f01

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html

    Filesize

    8KB

    MD5

    a11aa1df9124e29133052a0d78861017

    SHA1

    bb7bee34b22d0ecaa735440481a5328908d55224

    SHA256

    8d3a119e1439230bd1decc7112ce217e0679cc688de8db96fb336e2a1897d115

    SHA512

    2fd02bd05a329ba9c396a26e585beccdb1aaedc5859610c758743f0a968441c4c37f0e241fb0d9bfc1671b2ce8ae434fc61fbaa702950cad45bd51de65bd929b

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

    Filesize

    11KB

    MD5

    0b9f87ac2c5825fb410b51b402ff3448

    SHA1

    1455266af99a99e687fc104da8e0a8073bdef015

    SHA256

    8fe5b0939efc6eb706ecade8047c061dfce2a5cb4365e300cbc494214920a6fd

    SHA512

    d64d4d8b3ecf43ef1e4c13ed6c0a8d497b484c4fb38e36c790cefa8d7e392de615af2be5a6117c5cb5812b3d52e61ec91f7dc5c94638d213fc91b4bf7b7bd0c1

  • C:\Program Files\Java\jre1.8.0_66\THIRDPARTYLICENSEREADME-JAVAFX.txt

    Filesize

    107KB

    MD5

    a567e48cfeeeebaca66dbe99b2c05a85

    SHA1

    cd99afb15be41b0b5d31d93e50104508de094e13

    SHA256

    eb1bb9629ad9900b181fc00c218450bcb1043bdff38d936d4579431c027683ef

    SHA512

    d5b6b7269959db19988fa12e5cdef273ca8a8af004e4b9f8fcbb32f642d9bd687d911cda57ae675b730197d9711100be8778000fb8973515e2425d6192fc32d4

  • C:\Program Files\Java\jre1.8.0_66\THIRDPARTYLICENSEREADME.txt

    Filesize

    172KB

    MD5

    1ee841dd4325a47e6948bf5ae44d5db7

    SHA1

    e87118f5bc5b432675433fb67c16c39a7246cae0

    SHA256

    030377046188fd936e07b714b2f11ba3c4c9320b142bc8ec84617c6dbe15039b

    SHA512

    ad00b8827a4f5c63bff4f85d0cf522c9a0b28d3c5405d8ca9f83932b6d87556c62ce9e29496adba54dc3c4d359b6202e645b8ae3009d2f2de33e817a5496e4a7

  • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

    Filesize

    48B

    MD5

    dc2a130b4900c02951a1f7fbc9c5f7e0

    SHA1

    799ce73ed21c3550c7931326419af3d1617f8a6b

    SHA256

    b99826695d43bb033dd4cea7dd39e1ca6df2d5f8f45354443e6cfcc8b0a05870

    SHA512

    b0d7076c2f9f789079821257d171139e83e82b2e9bb42a0289310bccfdb6d124578931a6ddf8507b8c5b99d33dad0898b7f52bf468313b5898e3bb19d95b48b4

  • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe

    Filesize

    21KB

    MD5

    fec89e9d2784b4c015fed6f5ae558e08

    SHA1

    581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2

    SHA256

    489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065

    SHA512

    e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24

  • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe

    Filesize

    21KB

    MD5

    fec89e9d2784b4c015fed6f5ae558e08

    SHA1

    581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2

    SHA256

    489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065

    SHA512

    e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24

  • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe

    Filesize

    21KB

    MD5

    fec89e9d2784b4c015fed6f5ae558e08

    SHA1

    581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2

    SHA256

    489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065

    SHA512

    e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24

  • memory/2676-177-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-187-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-145-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-147-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-149-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-151-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-153-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-155-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-157-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-159-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-161-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-163-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-165-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-167-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-169-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-171-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-173-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-141-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-179-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-175-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-181-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-183-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-185-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-143-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-189-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-191-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-193-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-195-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-197-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-199-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-260-0x0000000004C00000-0x00000000051A4000-memory.dmp

    Filesize

    5.6MB

  • memory/2676-261-0x0000000002700000-0x0000000002792000-memory.dmp

    Filesize

    584KB

  • memory/2676-262-0x0000000002330000-0x0000000002340000-memory.dmp

    Filesize

    64KB

  • memory/2676-263-0x0000000002570000-0x0000000002571000-memory.dmp

    Filesize

    4KB

  • memory/2676-264-0x0000000005230000-0x000000000523A000-memory.dmp

    Filesize

    40KB

  • memory/2676-265-0x0000000002330000-0x0000000002340000-memory.dmp

    Filesize

    64KB

  • memory/2676-266-0x0000000002330000-0x0000000002340000-memory.dmp

    Filesize

    64KB

  • memory/2676-267-0x0000000002330000-0x0000000002340000-memory.dmp

    Filesize

    64KB

  • memory/2676-268-0x0000000002330000-0x0000000002340000-memory.dmp

    Filesize

    64KB

  • memory/2676-135-0x0000000002330000-0x0000000002340000-memory.dmp

    Filesize

    64KB

  • memory/2676-134-0x0000000002330000-0x0000000002340000-memory.dmp

    Filesize

    64KB

  • memory/2676-137-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-139-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-136-0x0000000002510000-0x000000000253B000-memory.dmp

    Filesize

    172KB

  • memory/2676-133-0x0000000002330000-0x0000000002340000-memory.dmp

    Filesize

    64KB

  • memory/4048-327-0x0000000002C50000-0x0000000002C60000-memory.dmp

    Filesize

    64KB

  • memory/4048-280-0x0000000000BE0000-0x0000000000BEC000-memory.dmp

    Filesize

    48KB

  • memory/4048-659-0x0000000002C50000-0x0000000002C60000-memory.dmp

    Filesize

    64KB