Resubmissions
21/02/2025, 20:20
250221-y4r9yszlfj 10Analysis
-
max time kernel
51s -
max time network
43s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2025, 20:20
Static task
static1
Behavioral task
behavioral1
Sample
Fantom.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Fantom.exe
Resource
win10v2004-20250217-en
General
-
Target
Fantom.exe
-
Size
261KB
-
MD5
7d80230df68ccba871815d68f016c282
-
SHA1
e10874c6108a26ceedfc84f50881824462b5b6b6
-
SHA256
f4234a501edcd30d3bc15c983692c9450383b73bdd310059405c5e3a43cc730b
-
SHA512
64d02b3e7ed82a64aaac1f74c34d6b6e6feaac665ca9c08911b93eddcec66595687024ec576e74ea09a1193ace3923969c75de8733859835fef45335cf265540
-
SSDEEP
3072:vDKW1LgppLRHMY0TBfJvjcTp5XxG8pt+oSOpE22obq+NYgvPuCEbMBWJxLRiUgV:vDKW1Lgbdl0TBBvjc/M8n35nYgvKjdzi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fantom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fantom.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1680 Fantom.exe Token: SeDebugPrivilege 4772 taskmgr.exe Token: SeSystemProfilePrivilege 4772 taskmgr.exe Token: SeCreateGlobalPrivilege 4772 taskmgr.exe Token: SeDebugPrivilege 4532 Fantom.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe 4772 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fantom.exe"C:\Users\Admin\AppData\Local\Temp\Fantom.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4772
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:328
-
C:\Users\Admin\AppData\Local\Temp\Fantom.exe"C:\Users\Admin\AppData\Local\Temp\Fantom.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4532