Analysis

  • max time kernel
    1493s
  • max time network
    1499s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    18-05-2024 15:47

General

  • Target

    2cbb3497bfa28d9966c1feeae96d452d.dll

  • Size

    1.6MB

  • MD5

    2cbb3497bfa28d9966c1feeae96d452d

  • SHA1

    9ef94c7d3fedc71bb3ed1abf542dfc7ec692883d

  • SHA256

    85c3b718090144dadeb8035ac287d46b9d3458f9de409229217d42a475f42868

  • SHA512

    eed7b210655030b3855f7a20f3bc7aecf8b927a33dfdaefe1d769fa42cbf7c88b1e8ab625f7258a79d2625e06005d25b03691fe911330876ae9e7f916ab2fe4c

  • SSDEEP

    24576:KlQyNmMnq70NDxLOd0+UU1Thef1HrmP1D2:KlQyNmMq70NDROd0+UU1ThoHrA

Malware Config

Extracted

Path

C:\README_TO_DECRYPT.html

Family

quantum

Ransom Note
<html> <head> <title>Quantum</title> </head> <body> <h1>Your ID:</h1> <b> <pre> f5de48b476c53833c47bc3b7c594420220deb62cd09f6034bdf3164bbef62937 </pre> </b> <hr/> This message contains an information how to fix the troubles you've got with your network.<br><br> Files on the workstations in your network were encrypted and any your attempt to change, decrypt or rename them could destroy the content.<br> The only way to get files back is a decryption with Key, provided by the Quantum Locker.<br><br> During the period your network was under our control, we downloaded a huge volume of information.<br> Now it is stored on our servers with high-secure access. This information contains a lot of sensitive, private and personal data.<br> Publishing of such data will cause serious consequences and even business disruption.<br><br> It's not a threat, on the contrary - it's a manual how to get a way out.<br> Quantum team doesn't aim to damage your company, our goals are only financial.<br><br> After a payment you'll get network decryption, full destruction of downloaded data, information about your network vulnerabilities and penetration points.<br> If you decide not to negotiate, in 48 hours the fact of the attack and all your information will be posted on our site and will be promoted among dozens of cyber forums, news agencies, websites etc.<br><br> To contact our support and start the negotiations, please visit our support chat.<br> It is simple, secure and you can set a password to avoid intervention of unauthorised persons.<br> <a href="http://lsxkornhwiuchwvtrm2ru2hr25rovmyvrurgej7kwv3vd6rvbznpdwid.onion/?cid=f5de48b476c53833c47bc3b7c594420220deb62cd09f6034bdf3164bbef62937">http://lsxkornhwiuchwvtrm2ru2hr25rovmyvrurgej7kwv3vd6rvbznpdwid.onion/?cid=f5de48b476c53833c47bc3b7c594420220deb62cd09f6034bdf3164bbef62937</a> <ul> <li>Password field should be blank for the first login. <li>Note that this server is available via Tor browser only. </ul> P.S. How to get TOR browser - see at https://www.torproject.org </body> </html>

Signatures

  • Quantum Ransomware

    A rebrand of the MountLocker ransomware first seen in August 2021.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 24 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\2cbb3497bfa28d9966c1feeae96d452d.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3808
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\2cbb3497bfa28d9966c1feeae96d452d.dll,#1
      2⤵
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4360
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\\0E577D2F.bat" "C:\Users\Admin\AppData\Local\Temp\2cbb3497bfa28d9966c1feeae96d452d.dll""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3412
        • C:\Windows\SysWOW64\attrib.exe
          attrib -s -r -h "C:\Users\Admin\AppData\Local\Temp\2cbb3497bfa28d9966c1feeae96d452d.dll"
          4⤵
          • Views/modifies file attributes
          PID:2400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\README_TO_DECRYPT.html

    Filesize

    2KB

    MD5

    5ad33fc6eb4dabd77715a95ac400e555

    SHA1

    9d1895169783943c3c35a87915bf4fb082fa77fd

    SHA256

    494f123c1c8a878207b26f5660f9be92a34b64d477fe814f05cbc4611d2517be

    SHA512

    a6dc80747eff2048b70fc03c9889ec0ce7e7859434f30a065f4ec53239064d16e317a15b2e2f3d94dda704c33571986716c161efbb1354fc76bbd1d61b5f925c

  • C:\Users\Admin\AppData\Local\Temp\0E577D2F.bat

    Filesize

    65B

    MD5

    348cae913e496198548854f5ff2f6d1e

    SHA1

    a07655b9020205bd47084afd62a8bb22b48c0cdc

    SHA256

    c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506

    SHA512

    799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611

  • memory/4360-19-0x0000000002410000-0x00000000024E1000-memory.dmp

    Filesize

    836KB

  • memory/4360-8-0x0000000002410000-0x00000000024E1000-memory.dmp

    Filesize

    836KB

  • memory/4360-4-0x0000000002410000-0x00000000024E1000-memory.dmp

    Filesize

    836KB

  • memory/4360-12-0x0000000002410000-0x00000000024E1000-memory.dmp

    Filesize

    836KB

  • memory/4360-11-0x0000000002410000-0x00000000024E1000-memory.dmp

    Filesize

    836KB

  • memory/4360-9-0x0000000002410000-0x00000000024E1000-memory.dmp

    Filesize

    836KB

  • memory/4360-0-0x0000000002410000-0x00000000024E1000-memory.dmp

    Filesize

    836KB

  • memory/4360-15-0x0000000002410000-0x00000000024E1000-memory.dmp

    Filesize

    836KB

  • memory/4360-3-0x0000000002410000-0x00000000024E1000-memory.dmp

    Filesize

    836KB

  • memory/4360-1-0x0000000002410000-0x00000000024E1000-memory.dmp

    Filesize

    836KB

  • memory/4360-1125-0x0000000002410000-0x00000000024E1000-memory.dmp

    Filesize

    836KB

  • memory/4360-1128-0x0000000002410000-0x00000000024E1000-memory.dmp

    Filesize

    836KB

  • memory/4360-1134-0x0000000002410000-0x00000000024E1000-memory.dmp

    Filesize

    836KB

  • memory/4360-2-0x0000000002410000-0x00000000024E1000-memory.dmp

    Filesize

    836KB