Analysis

  • max time kernel
    74s
  • max time network
    54s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2024 07:26

General

  • Target

    Fantom.exe

  • Size

    261KB

  • MD5

    7d80230df68ccba871815d68f016c282

  • SHA1

    e10874c6108a26ceedfc84f50881824462b5b6b6

  • SHA256

    f4234a501edcd30d3bc15c983692c9450383b73bdd310059405c5e3a43cc730b

  • SHA512

    64d02b3e7ed82a64aaac1f74c34d6b6e6feaac665ca9c08911b93eddcec66595687024ec576e74ea09a1193ace3923969c75de8733859835fef45335cf265540

  • SSDEEP

    3072:vDKW1LgppLRHMY0TBfJvjcTp5XxG8pt+oSOpE22obq+NYgvPuCEbMBWJxLRiUgV:vDKW1Lgbdl0TBBvjc/M8n35nYgvKjdzi

Malware Config

Extracted

Path

C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\DECRYPT_YOUR_FILES.HTML

Ransom Note
<html> <head> <style> body{ background-color: #3366CC; } h1 { background-color: RGB(249, 201, 16); } p { background-color: maroon; color: white; } </style> </head> <body> <center> <h1><b> Attention ! All your files </b> have been encrypted. </h1></br> <p> Due encrypting was used algoritm RSA-4096 and AES-256, used for protection military secrets.</br> That means > RESTORE YOU DATA POSIBLE ONLY BUYING decryption passwords from us.</br> Getting a decryption of your files is - SIMPLY task.</br></br> That all what you need:</br> 1. Sent Your ID_KEY on mailbox [email protected] or [email protected] </br> 2. For test, decrypt 2 small files, to be sure that we can decrypt you files.</br> 3. Pay our services. </br> 4. GET software with passwords for decrypt you files.</br> 5. Make measures to prevent this type situations again.</br></br> IMPORTANT(1)</br> Do not try restore files without our help, this is useless, and can destroy you data permanetly.</br></br> IMPORTANT(2) </br> We Cant hold you decryption passwords forever. </br>ALL DECRYPTION PASSWORDS, for what wasn`t we receive reward, will destroy after week of moment of encryption. </p> <p> Your ID_KEY: <br> </p> <table width="1024" border="0"> <tbody> <tr> <td><p>U6AlZXxYj6gQVrD3ycdCISvjY27pKGWMCUhil6114SyFfg0EMgUChKxc+aioxwYSe5tiwDEMCUvMzuxViRfFKuK0U+fET7lvn1i7muS0norG5xow9qdqCt+OZqD8csJtwjwry/nrgj1COycPqFCokLjz+2onr9WusWa9qtUTzxO/c72ltta2gIEYRdYJeWLBFaGX5JMAyIMWnSy914GnR677XdSFDAu77yfg3Nx6oaQjromgP5cMCH5mPkhj4hi3y2tgkB/s4oYXhyKsEVmeAOrQuOJRgyVaDgPKG3oRLJYqYQ6fzm/Jjeyehu2sngw/XrnwMlfaOeTMi1mQ+TyXqQ==ZW4tVVM=</p></td> </tr> </tbody> </table> </center></html></body>

Signatures

  • Fantom

    Ransomware which hides encryption process behind fake Windows Update screen.

  • Fantom family
  • Renames multiple (757) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Disables Task Manager via registry modification
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Fantom.exe
    "C:\Users\Admin\AppData\Local\Temp\Fantom.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe
      "C:\Users\Admin\AppData\Local\Temp\WindowsUpdate.exe"
      2⤵
      • Executes dropped EXE
      PID:1432
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1620
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2040

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\DECRYPT_YOUR_FILES.HTML

      Filesize

      1KB

      MD5

      8d183d7f44a5b6d1afa7582548e19ca1

      SHA1

      a84d27bf6aee458e63aef25426875c0501cfa8ff

      SHA256

      0da2995fec443c4316212d58c2db3336c7ee71971e7a44c9da802430d9c4b608

      SHA512

      bda3f6a7d57fbffd3f53797de28fc2796e1bb1137171d046abf29c6d470488d94f0e53653acf77a9de3b1b32fecf297b26f2b4facbff3052a43812c1dd059f05

    • C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\win32_LinkNoDrop32x32.gif

      Filesize

      160B

      MD5

      d021685af98bdde26ceb0fdb62a3d6ae

      SHA1

      f0f6f8846f6c2b943de323eaa5ace3bea450fb65

      SHA256

      9be8fe8ff10907142ddab30ae43772d95e019ddfbd4abf9f0ae7c10b2f546efb

      SHA512

      afa77fcad6989f91f8cbbbdcdff6d4a973b1635ebedb86083d08c3817ecbd69a3e4c6029d45080ad2e7bc2b1c53125cf8eed2b34fad5fe9ca70b9d333e8e13ea

    • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html

      Filesize

      12KB

      MD5

      f645b67b4398cce7c89d96565c0cd44c

      SHA1

      bd0fbe82e051bb8baf5018036c801c6885cbfcfa

      SHA256

      6831b04542035e647895c3da3f10b7c62ff49601b2eb1214da04a28880bc0ffc

      SHA512

      1341767996f9dcbd670aa94197ec3e7508098c5770d547c2e3b4e7f8771eb033291ce5789c67f4099a147af08eb835c9d060f262bfc2b8c0b031e64688a800c8

    • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html

      Filesize

      8KB

      MD5

      2c3ce9988ef76ed3255e3736c89e8deb

      SHA1

      03cb021ca043330706ee2b4070e5dc7521768db0

      SHA256

      239aed0c345bc6321a398d919b91b021b0a3a8dbd7b35e28389523e4af05a49f

      SHA512

      708ba3661c98066597d0ee6fbb7e70020ac8c846e30e58241e28e4155f8ad9192cdcf724c658f9f12a93a763e7f8797b58eef865f236ba95bf28370c8195cd17

    • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\asl-v20.txt

      Filesize

      11KB

      MD5

      cff33f9fe010c3a47493ced30ecf4d51

      SHA1

      7b22bd8b07b6967df403a038a98d5f752e17e138

      SHA256

      5e8190f45a36981e6e676bb0b2817b402c2379c34dcb0db9177c2751a73922c1

      SHA512

      942641d7efcba754b4fb0cc201474cef6d9ebcdcf125fd187bc5cd17b5d96289cb401dc1b8d284d23d804776325e86ed98fe2b3d50397a1474c8515f5030ca12

    • \Users\Admin\AppData\Local\Temp\WindowsUpdate.exe

      Filesize

      21KB

      MD5

      fec89e9d2784b4c015fed6f5ae558e08

      SHA1

      581fd9fb59bd42fbe7bd065cf0e6ff6d4d0daba2

      SHA256

      489f2546a4ad1e0e0147d1ca2fd8801785689f67fb850171ccbaa6306a152065

      SHA512

      e3bbf89cc0a955a2819455137e540952c55f417732a596ef314a46d5312b3bed644ac7595f75d3639ebc30e85f0f210dba0ef5b013d1b83bafd2c17a9d685a24

    • memory/1432-145-0x0000000000330000-0x000000000033C000-memory.dmp

      Filesize

      48KB

    • memory/1620-134-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/1620-135-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/1620-136-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/1620-137-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/1668-54-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-36-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-24-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-46-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-52-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-129-0x0000000074410000-0x0000000074AFE000-memory.dmp

      Filesize

      6.9MB

    • memory/1668-68-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-67-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-64-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-62-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-130-0x0000000074410000-0x0000000074AFE000-memory.dmp

      Filesize

      6.9MB

    • memory/1668-131-0x0000000074410000-0x0000000074AFE000-memory.dmp

      Filesize

      6.9MB

    • memory/1668-60-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-59-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-56-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-38-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-50-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-48-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-44-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-42-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-40-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-34-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-32-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-30-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-28-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-26-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-22-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-20-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-18-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-14-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-12-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-10-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-8-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-6-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-5-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-132-0x000000007441E000-0x000000007441F000-memory.dmp

      Filesize

      4KB

    • memory/1668-133-0x0000000074410000-0x0000000074AFE000-memory.dmp

      Filesize

      6.9MB

    • memory/1668-16-0x0000000001F80000-0x0000000001FAB000-memory.dmp

      Filesize

      172KB

    • memory/1668-4-0x0000000074410000-0x0000000074AFE000-memory.dmp

      Filesize

      6.9MB

    • memory/1668-3-0x0000000074410000-0x0000000074AFE000-memory.dmp

      Filesize

      6.9MB

    • memory/1668-2-0x0000000001F80000-0x0000000001FB2000-memory.dmp

      Filesize

      200KB

    • memory/1668-1-0x0000000001E30000-0x0000000001E62000-memory.dmp

      Filesize

      200KB

    • memory/1668-0-0x000000007441E000-0x000000007441F000-memory.dmp

      Filesize

      4KB

    • memory/1668-138-0x0000000002220000-0x000000000222E000-memory.dmp

      Filesize

      56KB