Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-07-2023 12:48

General

  • Target

    Fantom.exe

  • Size

    261KB

  • MD5

    7d80230df68ccba871815d68f016c282

  • SHA1

    e10874c6108a26ceedfc84f50881824462b5b6b6

  • SHA256

    f4234a501edcd30d3bc15c983692c9450383b73bdd310059405c5e3a43cc730b

  • SHA512

    64d02b3e7ed82a64aaac1f74c34d6b6e6feaac665ca9c08911b93eddcec66595687024ec576e74ea09a1193ace3923969c75de8733859835fef45335cf265540

  • SSDEEP

    3072:vDKW1LgppLRHMY0TBfJvjcTp5XxG8pt+oSOpE22obq+NYgvPuCEbMBWJxLRiUgV:vDKW1Lgbdl0TBBvjc/M8n35nYgvKjdzi

Malware Config

Extracted

Path

C:\Program Files\7-Zip\Lang\DECRYPT_YOUR_FILES.HTML

Ransom Note
<html> <head> <style> body{ background-color: #3366CC; } h1 { background-color: RGB(249, 201, 16); } p { background-color: maroon; color: white; } </style> </head> <body> <center> <h1><b> Attention ! All your files </b> have been encrypted. </h1></br> <p> Due encrypting was used algoritm RSA-4096 and AES-256, used for protection military secrets.</br> That means > RESTORE YOU DATA POSIBLE ONLY BUYING decryption passwords from us.</br> Getting a decryption of your files is - SIMPLY task.</br></br> That all what you need:</br> 1. Sent Your ID_KEY on mailbox [email protected] or [email protected] </br> 2. For test, decrypt 2 small files, to be sure that we can decrypt you files.</br> 3. Pay our services. </br> 4. GET software with passwords for decrypt you files.</br> 5. Make measures to prevent this type situations again.</br></br> IMPORTANT(1)</br> Do not try restore files without our help, this is useless, and can destroy you data permanetly.</br></br> IMPORTANT(2) </br> We Cant hold you decryption passwords forever. </br>ALL DECRYPTION PASSWORDS, for what wasn`t we receive reward, will destroy after week of moment of encryption. </p> <p> Your ID_KEY: <br> </p> <table width="1024" border="0"> <tbody> <tr> <td><p>Zsd3708WsoQ76yuABHspWcpO3AekBTTKo0XCM989RXMTLV5js5FET36wnoOt2D+e/OcBSc8lAWZWlgMZgpZQ4b52oW1khxTmq3RTIc82mYXrn7CshN9/vQyIox/GxGEBmDHh4bD9GohItMwD6lE9WLh75dY+tNdEG/7rxsTexHM4VxVGLcSGfr3+Xa3dieL0ipmlewiXWOcV1cs0Yu0LbEElcWRWJXE2zCxm5g3OluDo54LxHMkflsLsruVb1QWaBzbcOn7bBg6DnA9+5yfFNTPza4RBgpi5iNWIyOw/AJ8MzMmkyWGtj20sLA0b6rwkVzyRE36/RLJNVizot/o0jA==ZW4tVVM=</p></td> </tr> </tbody> </table> </center></html></body>

Signatures

  • Fantom

    Ransomware which hides encryption process behind fake Windows Update screen.

  • Renames multiple (1917) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Disables Task Manager via registry modification
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:2256
  • C:\Users\Admin\AppData\Local\Temp\Fantom.exe
    "C:\Users\Admin\AppData\Local\Temp\Fantom.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4388
    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe
      "C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"
      2⤵
      • Executes dropped EXE
      PID:4696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\Lang\DECRYPT_YOUR_FILES.HTML

    Filesize

    1KB

    MD5

    1394be1453090ff7849399b8bb7cf91f

    SHA1

    069d0149c1463b98fd8ea0e383a6fc1f19e75708

    SHA256

    b7f830b43d92bee022013a5c853ac396aea5750b4d0cce950c29bc34f27e944f

    SHA512

    8255e8af4f077ad26fb0014c20b097e20a4583a175d011b0c7b7371828ddafbf775b81ee1e71967c4e15625c1d761bd6a561e540c0b526362ddfc195216d85fd

  • C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\win32_LinkNoDrop32x32.gif

    Filesize

    160B

    MD5

    379a2cfc01ebb78f585cc41bb61849e8

    SHA1

    2bcf24c939514fbf0acac1b689ee24e9645850aa

    SHA256

    9c0af5014ae8d196a5bd307933584bd4c1009ee92c48d2ef427446abe77c8526

    SHA512

    c91468273361a867553a0286eba1939ada37aafd5a3ac544be692863e08f9dff76e7b48709fdeb01763ecf47ef748241a42d349356d986081e54db73f55169cc

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html

    Filesize

    12KB

    MD5

    a969861bc96b4002a937b2627ec12f31

    SHA1

    cd50933cd42fd706176019be1c9477cbf017382c

    SHA256

    7f4a5dcf1b8a0cc9031862403f379285d03f599e03cf432bd87c12ee8767f8a9

    SHA512

    260cf35b8797aafd0410e080a24bbd762ea405629ca3a88da2ea3e1d7079e2a542484b4c782888b020eec46624b93db50af0d6108ecf1255fd7d4f71bf108b5f

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html

    Filesize

    8KB

    MD5

    7d97686724eeea14d0d05be5c9a843a9

    SHA1

    c21b1bfa3a7b4c53bc795a0d7bb0d9a56cc302df

    SHA256

    7f32a7cc0f9c17d38f6ae5be4ba2cb2c451ac3d504de3f956a4e49ccd8eaedd7

    SHA512

    634393461057a09fb60ec5c9a06c975f147b646c4f398cee66a3631ec9954ee40624326e9b35f81829020f3bd06479d331144ecb2e8e7be2aa95d2f0474c5cb1

  • C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

    Filesize

    11KB

    MD5

    def912245db1fb9defb477c67c2fb2a9

    SHA1

    d97af1d39502dc6f143aad1eaee75a78cb3ef202

    SHA256

    18f7e60ca4b6e1f55578a2776eafc0b90dc62ceb86e6350cef492f0d0309ea83

    SHA512

    743dc0f9622b4acf17e881b49e76b11b074bae33a2494fae3f821e121d495c34f4e19b6d762e4a0884e7f77e12f8f337069724027a0c4edeb00dce1190f6d64e

  • C:\Program Files\Java\jre1.8.0_66\THIRDPARTYLICENSEREADME-JAVAFX.txt

    Filesize

    107KB

    MD5

    cf7e03d98b030378bb5b0ea92a479351

    SHA1

    cf704a61e715d74ec82bf02841d63a7f48a9d84d

    SHA256

    19ca9ed3ebdb299cc0104edc6dc763dc0213580d36b54008b8fb539d0dcd3fe3

    SHA512

    6e2cef6e7d51efa9a2492a71b6638046007be081d9916a42ad4d327a4cddbc09050f3e60caaebca649167911e8e56bf1f35eb90bb80cf56bbc2993dd22b037d9

  • C:\Program Files\Java\jre1.8.0_66\THIRDPARTYLICENSEREADME.txt

    Filesize

    172KB

    MD5

    fd3e017c170c36c1597d34ca5931bcd6

    SHA1

    969755a641f64382e1427c1e7255eb6b60e7a986

    SHA256

    1aac95e08c1012e291bd80dbffc727d314e1111b0f070803d237b805b60320e3

    SHA512

    371188589fc3052a570e6bc4532c5c1f35aa34a3ed8e7d3970427966d2bff144a315d79d99182753599bbcd0f9efa5daa8491627d7b7df6fefb4cafa57a84345

  • C:\Program Files\Microsoft Office\root\Office16\1033\ClientSub2019_eula.txt

    Filesize

    48B

    MD5

    1971ce88da19b3272093218defb7e401

    SHA1

    08c97e27bfecc9e731a91739b4edd27147d21854

    SHA256

    5138109baf35d24fc146f471bce50d14779613a03a2c11d39ccfc1b057c3cda7

    SHA512

    dc1ae312569f959ed1c418c94793d8e32b8a556dc3170dd9e54f857e2eff41e844e0f2436f96bef05c17fb72d940d76624d158618b336f9c9aaf4c8aaaed61c6

  • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe

    Filesize

    21KB

    MD5

    fec89e9d2784b4c015fed6f5ae558e08

    SHA1

    581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2

    SHA256

    489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065

    SHA512

    e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24

  • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe

    Filesize

    21KB

    MD5

    fec89e9d2784b4c015fed6f5ae558e08

    SHA1

    581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2

    SHA256

    489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065

    SHA512

    e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24

  • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe

    Filesize

    21KB

    MD5

    fec89e9d2784b4c015fed6f5ae558e08

    SHA1

    581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2

    SHA256

    489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065

    SHA512

    e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24

  • memory/4388-159-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-201-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-155-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-157-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-133-0x0000000074E70000-0x0000000075620000-memory.dmp

    Filesize

    7.7MB

  • memory/4388-161-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-163-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-165-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-167-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-169-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-171-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-173-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-175-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-177-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-179-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-181-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-183-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-185-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-187-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-189-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-191-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-193-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-195-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-197-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-199-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-153-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-262-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/4388-263-0x00000000025A0000-0x00000000025A1000-memory.dmp

    Filesize

    4KB

  • memory/4388-264-0x0000000004BB0000-0x0000000005154000-memory.dmp

    Filesize

    5.6MB

  • memory/4388-265-0x0000000005160000-0x00000000051F2000-memory.dmp

    Filesize

    584KB

  • memory/4388-266-0x0000000005380000-0x000000000538A000-memory.dmp

    Filesize

    40KB

  • memory/4388-273-0x0000000074E70000-0x0000000075620000-memory.dmp

    Filesize

    7.7MB

  • memory/4388-274-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/4388-151-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-148-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-146-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-134-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/4388-135-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/4388-136-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/4388-144-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-138-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-137-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-142-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4388-140-0x0000000002540000-0x000000000256B000-memory.dmp

    Filesize

    172KB

  • memory/4696-669-0x000000001B330000-0x000000001B340000-memory.dmp

    Filesize

    64KB

  • memory/4696-667-0x00007FF8F4E80000-0x00007FF8F5941000-memory.dmp

    Filesize

    10.8MB

  • memory/4696-294-0x000000001B330000-0x000000001B340000-memory.dmp

    Filesize

    64KB

  • memory/4696-291-0x00007FF8F4E80000-0x00007FF8F5941000-memory.dmp

    Filesize

    10.8MB

  • memory/4696-286-0x0000000000650000-0x000000000065C000-memory.dmp

    Filesize

    48KB