Analysis
-
max time kernel
55s -
max time network
53s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01-03-2024 01:41
Static task
static1
Behavioral task
behavioral1
Sample
Fantom.exe
Resource
win10v2004-20240226-en
General
-
Target
Fantom.exe
-
Size
261KB
-
MD5
7d80230df68ccba871815d68f016c282
-
SHA1
e10874c6108a26ceedfc84f50881824462b5b6b6
-
SHA256
f4234a501edcd30d3bc15c983692c9450383b73bdd310059405c5e3a43cc730b
-
SHA512
64d02b3e7ed82a64aaac1f74c34d6b6e6feaac665ca9c08911b93eddcec66595687024ec576e74ea09a1193ace3923969c75de8733859835fef45335cf265540
-
SSDEEP
3072:vDKW1LgppLRHMY0TBfJvjcTp5XxG8pt+oSOpE22obq+NYgvPuCEbMBWJxLRiUgV:vDKW1Lgbdl0TBBvjc/M8n35nYgvKjdzi
Malware Config
Extracted
C:\Program Files\7-Zip\Lang\DECRYPT_YOUR_FILES.HTML
Signatures
-
Fantom
Ransomware which hides encryption process behind fake Windows Update screen.
-
Renames multiple (152) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation Fantom.exe -
Executes dropped EXE 1 IoCs
pid Process 4756 WindowsUpdate.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\sq.txt Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipssrl.xml Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\ar-SA\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\fi-FI\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_rtl.xml Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\fr.txt Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt Fantom.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipscht.xml Fantom.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_200_percent.pak Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\sw.txt Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\keypadbase.xml Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_jpn.xml Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\tr-TR\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\BlockAdd.7z Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt Fantom.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.0\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\7-Zip\readme.txt Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipscat.xml Fantom.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\nb-NO\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\microsoft shared\VC\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\he-IL\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\Microsoft.WindowsDesktop.App.deps.json Fantom.exe File opened for modification C:\Program Files\InitializeSync.htm Fantom.exe File opened for modification C:\Program Files\7-Zip\History.txt Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt Fantom.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\resources.pak Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsen.xml Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipshi.xml Fantom.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\System\ado\ja-JP\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\System\Ole DB\de-DE\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.25\Microsoft.NETCore.App.runtimeconfig.json Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsplk.xml Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipstr.xml Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\th-TH\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\microsoft shared\TextConv\en-US\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\7-Zip\7zCon.sfx Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\ext.txt Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt Fantom.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.25\tr\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\de-DE\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\uk-UA\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\System\msadc\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\default_apps\external_extensions.json Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsptb.xml Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipssrb.xml Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-CA\DECRYPT_YOUR_FILES.HTML Fantom.exe File created C:\Program Files\Common Files\microsoft shared\Triedit\en-US\DECRYPT_YOUR_FILES.HTML Fantom.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt Fantom.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4376 Fantom.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4376 Fantom.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4376 wrote to memory of 4756 4376 Fantom.exe 98 PID 4376 wrote to memory of 4756 4376 Fantom.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fantom.exe"C:\Users\Admin\AppData\Local\Temp\Fantom.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"2⤵
- Executes dropped EXE
PID:4756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55b815582a89d887ce4d6756171336e80
SHA18f46767c7867c613470d041aa7e5249018662781
SHA256543989af2d34df456bed9813ea2f71b61fd2060efaed417bc93028bc6a1270a1
SHA512b2b927d0c3182a71e64d8b324bd24edf3c2c19d4fe3ef0026008e7ede1113b541a580e5be924b5461bd52a37114fff9313f7c0c94e12da3f539dd665def6c4f1
-
Filesize
21KB
MD5fec89e9d2784b4c015fed6f5ae558e08
SHA1581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2
SHA256489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065
SHA512e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24