Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 16:11

General

  • Target

    bb6ec92275ec00a69b2c6e0532509222093d7026c8766274a69d985bcc1eb65e.exe

  • Size

    75KB

  • MD5

    c53e027bf91d7e8c8da245ccd28279e5

  • SHA1

    4d1fb9ab277f997a63cd42fd76467715b67579e4

  • SHA256

    bb6ec92275ec00a69b2c6e0532509222093d7026c8766274a69d985bcc1eb65e

  • SHA512

    5444f4b9737639dcf3321ae8d8ecea2e8865de3acae50a054136d741911371b4102b7a7f47a66d15d08c63022cb1afd3c00ee3241bb8be38ccfd8adda53a674a

  • SSDEEP

    1536:9aX51pVH9hsgNGLs6BLM1frxz/HTfcKKBaJGff:OfJGLs6BwNxnfTKsGff

Score
10/10

Malware Config

Signatures

  • Quantum Ransomware

    A rebrand of the MountLocker ransomware first seen in August 2021.

  • Deletes itself 1 IoCs
  • Drops desktop.ini file(s) 26 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb6ec92275ec00a69b2c6e0532509222093d7026c8766274a69d985bcc1eb65e.exe
    "C:\Users\Admin\AppData\Local\Temp\bb6ec92275ec00a69b2c6e0532509222093d7026c8766274a69d985bcc1eb65e.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:492
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\\0F762146.bat" "C:\Users\Admin\AppData\Local\Temp\bb6ec92275ec00a69b2c6e0532509222093d7026c8766274a69d985bcc1eb65e.exe""
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1692
      • C:\Windows\system32\attrib.exe
        attrib -s -r -h "C:\Users\Admin\AppData\Local\Temp\bb6ec92275ec00a69b2c6e0532509222093d7026c8766274a69d985bcc1eb65e.exe"
        3⤵
        • Views/modifies file attributes
        PID:1768
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\README_TO_DECRYPT.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0F762146.bat

    Filesize

    65B

    MD5

    348cae913e496198548854f5ff2f6d1e

    SHA1

    a07655b9020205bd47084afd62a8bb22b48c0cdc

    SHA256

    c80128f51871eec3ae2057989a025ce244277c1c180498a5aaef45d5214b8506

    SHA512

    799796736d41d3fcb5a7c859571bb025ca2d062c4b86e078302be68c1a932ed4f78e003640df5405274364b5a9a9c0ba5e37177997683ee7ab54e5267590b611

  • C:\Users\Admin\Desktop\README_TO_DECRYPT.html

    Filesize

    7KB

    MD5

    df136228be0a9e7fddc938fb15c2a136

    SHA1

    0b2e39b4cac2e54eda4b9184e90205ae961e40e1

    SHA256

    6d6b47dbbb2e0faa18a0d71d43d861f8a877541124a46aa5f7c148f296a65cda

    SHA512

    ece691a60e1e73cef9d2de76a93b96f75c6af13e23119bea2b19b9eeeaee07b862b82c5efd220bcf1413e3d86c867635b63951ef474152df5c9304290e6fb76a