Analysis

  • max time kernel
    115s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-04-2024 15:07

General

  • Target

    fd7ca7af9b2b6c5ffdb3206d647301de8bea33a69679e117be30e9a601c5dea2.dll

  • Size

    1.5MB

  • MD5

    8ab1d468e5aee87a0a6011958751f077

  • SHA1

    a54c911341a6b98541699da4516d563c737d96a1

  • SHA256

    fd7ca7af9b2b6c5ffdb3206d647301de8bea33a69679e117be30e9a601c5dea2

  • SHA512

    d8dd46f94163dfa4e1b29ef4c5df81c1a1f4eaba40714e90987dc547ff1e8831accf0897ad7643ece5924a018d60a5d65ad4f33b32c0079d24772baf6c327d83

  • SSDEEP

    24576:rFcel074vHDSYJeyyppTEgQn65IfsTXz:ZRly4fDSYJeyy7TEHc

Malware Config

Extracted

Path

C:\Recovery\WindowsRE\README_TO_DECRYPT.html

Family

quantum

Ransom Note
<html> <head> <title>Quantum</title> </head> <body> <h1>Your ID:</h1> <b> <pre> ba1cdb058d772a0c20f396a1de8c483f3293ad0eea531dd09a3e75ac9e3f6f73 </pre> </b> <hr/> This message contains an information how to fix the troubles you've got with your network.<br><br> Files on the workstations in your network were encrypted and any your attempt to change, decrypt or rename them could destroy the content.<br> The only way to get files back is a decryption with Key, provided by the Quantum Locker.<br><br> During the period your network was under our control, we downloaded a huge volume of information.<br> Now it is stored on our servers with high-secure access. This information contains a lot of sensitive, private and personal data.<br> Publishing of such data will cause serious consequences and even business disruption.<br><br> It's not a threat, on the contrary - it's a manual how to get a way out.<br> Quantum team doesn't aim to damage your company, our goals are only financial.<br><br> After a payment you'll get network decryption, full destruction of downloaded data, information about your network vulnerabilities and penetration points.<br> If you decide not to negotiate, in 48 hours the fact of the attack and all your information will be posted on our site and will be promoted among dozens of cyber forums, news agencies, websites etc.<br><br> To contact our support and start the negotiations, please visit our support chat.<br> It is simple, secure and you can set a password to avoid intervention of unauthorised persons.<br> <a href="http://obqregdsd7dmilzf3aqvegn3sofpufsvb2n3m2dvwfhsgthemvyi44qd.onion/?cid=ba1cdb058d772a0c20f396a1de8c483f3293ad0eea531dd09a3e75ac9e3f6f73">http://obqregdsd7dmilzf3aqvegn3sofpufsvb2n3m2dvwfhsgthemvyi44qd.onion/?cid=ba1cdb058d772a0c20f396a1de8c483f3293ad0eea531dd09a3e75ac9e3f6f73</a> <ul> <li>Password field should be blank for the first login. <li>Note that this server is available via Tor browser only. </ul> P.S. How to get TOR browser - see at https://www.torproject.org </body> </html>

Signatures

  • Quantum Ransomware

    A rebrand of the MountLocker ransomware first seen in August 2021.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 25 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\fd7ca7af9b2b6c5ffdb3206d647301de8bea33a69679e117be30e9a601c5dea2.dll,#1
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3176
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\\0E587C4F.bat" """
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4600
      • C:\Windows\system32\attrib.exe
        attrib -s -r -h ""
        3⤵
        • Views/modifies file attributes
        PID:2784
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2796 --field-trial-handle=2268,i,8796662530135712346,11409037572378858775,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3276

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Recovery\WindowsRE\README_TO_DECRYPT.html

      Filesize

      2KB

      MD5

      ee02571ac1de418bd5b692b348dacfad

      SHA1

      9533efbc0cb7f77e1250da9e2d497c728c9c0ff1

      SHA256

      6e2c184f6d35a30803beac896191b2c77be9e56dab52c4d993ace752d15531e2

      SHA512

      1f98214e9bc8044b07d91f5b0348a5b7e123fb0d60907b50ef4ff59a8297d68479a55e6de316fc8f35c89f36546084fbb28d8840e65c0a3032cb68a6c2e6690f

    • C:\Users\Admin\AppData\Local\Temp\.log

      Filesize

      471KB

      MD5

      a8253125b89bb39d67a2f0926c176eca

      SHA1

      9b618b3355b03a0dbd7f2008505b1434969b1392

      SHA256

      bd9ee58f751e7bf2eef1b10df8a9fc2574d0deffd7d4291efa9094dffbc5b361

      SHA512

      49e61f4036f4cb6b5e8f1c746a3f254a8f23dbfb36267f42b66d07e6340a43fe263d3f9c91415da2c2da41d7ef2e42bd0fe1c72f987c010aa357d936216cfe2e

    • C:\Users\Admin\AppData\Local\Temp\0E587C4F.bat

      Filesize

      65B

      MD5

      348cae913e496198548854f5ff2f6d1e

      SHA1

      a07655b9020205bd47084afd62a8bb22b48c0cdc

      SHA256

      c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506

      SHA512

      799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611

    • memory/3176-2-0x000001B49FC60000-0x000001B49FC78000-memory.dmp

      Filesize

      96KB

    • memory/3176-769-0x000001B49FC60000-0x000001B49FC78000-memory.dmp

      Filesize

      96KB

    • memory/3176-43-0x000001B49FC60000-0x000001B49FC78000-memory.dmp

      Filesize

      96KB

    • memory/3176-41-0x000001B49FC60000-0x000001B49FC78000-memory.dmp

      Filesize

      96KB

    • memory/3176-44-0x000001B49FC60000-0x000001B49FC78000-memory.dmp

      Filesize

      96KB

    • memory/3176-4-0x000001B49FC60000-0x000001B49FC78000-memory.dmp

      Filesize

      96KB

    • memory/3176-12-0x000001B49FC60000-0x000001B49FC78000-memory.dmp

      Filesize

      96KB

    • memory/3176-0-0x000001B49FC60000-0x000001B49FC78000-memory.dmp

      Filesize

      96KB

    • memory/3176-774-0x000001B49FC60000-0x000001B49FC78000-memory.dmp

      Filesize

      96KB

    • memory/3176-831-0x000001B49FC60000-0x000001B49FC78000-memory.dmp

      Filesize

      96KB

    • memory/3176-1380-0x000001B49FC60000-0x000001B49FC78000-memory.dmp

      Filesize

      96KB

    • memory/3176-1388-0x000001B49FC60000-0x000001B49FC78000-memory.dmp

      Filesize

      96KB

    • memory/3176-6-0x000001B49FC60000-0x000001B49FC78000-memory.dmp

      Filesize

      96KB

    • memory/3176-1-0x000001B49FC60000-0x000001B49FC78000-memory.dmp

      Filesize

      96KB