Analysis
-
max time kernel
38s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 12:20
Static task
static1
Behavioral task
behavioral1
Sample
ͨCFCAؼ v3.4.0.4/CryptoKit.AmericanExpress.x64.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ͨCFCAؼ v3.4.0.4/CryptoKit.AmericanExpress.x64.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
ͨCFCAؼ v3.4.0.4/CryptoKit.AmericanExpress.x86.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
ͨCFCAؼ v3.4.0.4/CryptoKit.AmericanExpress.x86.exe
Resource
win10v2004-20220901-en
General
-
Target
ͨCFCAؼ v3.4.0.4/CryptoKit.AmericanExpress.x64.exe
-
Size
747KB
-
MD5
fe48508635c0f38d53acf80713ecf463
-
SHA1
3697f5d2a0f7a8e8dbc71b21e52f3676de2ac8f8
-
SHA256
d9fe28b4399aafc7c5c666d066bbbf9d56ac62197884c348bcbab6bb57cb8896
-
SHA512
5e2804c139d8e80177fb9f9e6f804f7bdd8afffd251abe994d4de6430a413d7805dc57287bbdf7733f411a4a224c067ee838ad2dbadf2f0844c2b9572ee04e32
-
SSDEEP
12288:3zZ4UjD5HOMZUpS2lmLrt06x6tKPIh8cR6Sr67idYHUZ6d25PlJKkBy5Y+Z:3zZfOMZUpRmLrt06YtKPIh8M3r67lS6P
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{46B713A2-C992-4AE7-A56C-0A935CBF238E}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{46B713A2-C992-4AE7-A56C-0A935CBF238E}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{46B713A2-C992-4AE7-A56C-0A935CBF238E}\InprocServer32\ = "C:\\Windows\\system32\\CryptoKit.AmericanExpress.x64.dll" regsvr32.exe -
Loads dropped DLL 2 IoCs
pid Process 1416 CryptoKit.AmericanExpress.x64.exe 1592 regsvr32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\CryptoKit.AmericanExpress.x64.dll CryptoKit.AmericanExpress.x64.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\CFCA\CryptoKit.AmericanExpress.x64\uninst.exe CryptoKit.AmericanExpress.x64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CryptoKit.CryptoAgent.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F3F42EA7-1E7A-4AFE-8C5D-F5A8D372B8DB}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CryptoKit.CryptoAgent\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{46B713A2-C992-4AE7-A56C-0A935CBF238E}\ = "CryptoAgent Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{012863A9-0C22-49B9-BAEF-C5C33C0D4459} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{012863A9-0C22-49B9-BAEF-C5C33C0D4459}\1.0\ = "CryptoKit.AmericanExpress.x64 3.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{012863A9-0C22-49B9-BAEF-C5C33C0D4459}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{012863A9-0C22-49B9-BAEF-C5C33C0D4459}\1.0\HELPDIR\ = "C:\\Windows\\system32" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F42EA7-1E7A-4AFE-8C5D-F5A8D372B8DB}\ = "ICryptoAgent" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F42EA7-1E7A-4AFE-8C5D-F5A8D372B8DB}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CryptoKit.CryptoAgent.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CryptoKit.CryptoAgent\ = "CryptoAgent Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{46B713A2-C992-4AE7-A56C-0A935CBF238E} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{46B713A2-C992-4AE7-A56C-0A935CBF238E}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{012863A9-0C22-49B9-BAEF-C5C33C0D4459}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{012863A9-0C22-49B9-BAEF-C5C33C0D4459}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F42EA7-1E7A-4AFE-8C5D-F5A8D372B8DB}\TypeLib\ = "{012863A9-0C22-49B9-BAEF-C5C33C0D4459}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F42EA7-1E7A-4AFE-8C5D-F5A8D372B8DB}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F3F42EA7-1E7A-4AFE-8C5D-F5A8D372B8DB} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F3F42EA7-1E7A-4AFE-8C5D-F5A8D372B8DB}\TypeLib\ = "{012863A9-0C22-49B9-BAEF-C5C33C0D4459}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F42EA7-1E7A-4AFE-8C5D-F5A8D372B8DB}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F3F42EA7-1E7A-4AFE-8C5D-F5A8D372B8DB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CryptoKit.CryptoAgent.1\CLSID\ = "{46B713A2-C992-4AE7-A56C-0A935CBF238E}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{46B713A2-C992-4AE7-A56C-0A935CBF238E}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{46B713A2-C992-4AE7-A56C-0A935CBF238E}\VersionIndependentProgID\ = "CryptoKit.CryptoAgent" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{012863A9-0C22-49B9-BAEF-C5C33C0D4459}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{012863A9-0C22-49B9-BAEF-C5C33C0D4459}\1.0\0\win64\ = "C:\\Windows\\system32\\CryptoKit.AmericanExpress.x64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F42EA7-1E7A-4AFE-8C5D-F5A8D372B8DB} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CryptoKit.CryptoAgent\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{46B713A2-C992-4AE7-A56C-0A935CBF238E}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{012863A9-0C22-49B9-BAEF-C5C33C0D4459}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CryptoKit.CryptoAgent regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{46B713A2-C992-4AE7-A56C-0A935CBF238E}\InprocServer32\ = "C:\\Windows\\system32\\CryptoKit.AmericanExpress.x64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{46B713A2-C992-4AE7-A56C-0A935CBF238E}\TypeLib\ = "{012863A9-0C22-49B9-BAEF-C5C33C0D4459}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{012863A9-0C22-49B9-BAEF-C5C33C0D4459}\1.0\0\win64 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F3F42EA7-1E7A-4AFE-8C5D-F5A8D372B8DB}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F3F42EA7-1E7A-4AFE-8C5D-F5A8D372B8DB}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CryptoKit.CryptoAgent\CLSID\ = "{46B713A2-C992-4AE7-A56C-0A935CBF238E}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CryptoKit.CryptoAgent\CurVer\ = "CryptoKit.CryptoAgent.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{46B713A2-C992-4AE7-A56C-0A935CBF238E}\ProgID\ = "CryptoKit.CryptoAgent.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{46B713A2-C992-4AE7-A56C-0A935CBF238E}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{46B713A2-C992-4AE7-A56C-0A935CBF238E}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F3F42EA7-1E7A-4AFE-8C5D-F5A8D372B8DB}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CryptoKit.CryptoAgent.1\ = "CryptoAgent Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{46B713A2-C992-4AE7-A56C-0A935CBF238E}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F3F42EA7-1E7A-4AFE-8C5D-F5A8D372B8DB}\ = "ICryptoAgent" regsvr32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1416 wrote to memory of 1592 1416 CryptoKit.AmericanExpress.x64.exe 26 PID 1416 wrote to memory of 1592 1416 CryptoKit.AmericanExpress.x64.exe 26 PID 1416 wrote to memory of 1592 1416 CryptoKit.AmericanExpress.x64.exe 26 PID 1416 wrote to memory of 1592 1416 CryptoKit.AmericanExpress.x64.exe 26 PID 1416 wrote to memory of 1592 1416 CryptoKit.AmericanExpress.x64.exe 26 PID 1416 wrote to memory of 1592 1416 CryptoKit.AmericanExpress.x64.exe 26 PID 1416 wrote to memory of 1592 1416 CryptoKit.AmericanExpress.x64.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\ͨCFCAؼ v3.4.0.4\CryptoKit.AmericanExpress.x64.exe"C:\Users\Admin\AppData\Local\Temp\ͨCFCAؼ v3.4.0.4\CryptoKit.AmericanExpress.x64.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\system32\regsvr32.exe"regsvr32.exe" "C:\Windows\system32\CryptoKit.AmericanExpress.x64.dll" /s2⤵
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
PID:1592
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5c8b24d96f964062635de3b322fddf246
SHA1d9f984a22273d4a7c4b2a8d5f14210683b44a9be
SHA256a25b6c064dda554064f6217aca87083fd27d8f54e40dd27dfeaa7b251cc93665
SHA512d5febcdcece0501f7ccdf882a31196c1915c813e5b0175a123b69aa2ceb4d73706abdf4720ad5ac63e906b41582b28aee3f24ec6218b633dc0de840127b59c32
-
Filesize
11KB
MD5959ea64598b9a3e494c00e8fa793be7e
SHA140f284a3b92c2f04b1038def79579d4b3d066ee0
SHA25603cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b
SHA5125e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64
-
Filesize
1.4MB
MD5c8b24d96f964062635de3b322fddf246
SHA1d9f984a22273d4a7c4b2a8d5f14210683b44a9be
SHA256a25b6c064dda554064f6217aca87083fd27d8f54e40dd27dfeaa7b251cc93665
SHA512d5febcdcece0501f7ccdf882a31196c1915c813e5b0175a123b69aa2ceb4d73706abdf4720ad5ac63e906b41582b28aee3f24ec6218b633dc0de840127b59c32