Analysis

  • max time kernel
    164s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 18:39

General

  • Target

    2022-11-23_97302eada3f130412e4a00c771f6dc44_cryptolocker.exe

  • Size

    44KB

  • MD5

    97302eada3f130412e4a00c771f6dc44

  • SHA1

    6003d9f4dcbf3d82e3d3fe813d0e1952bce414f9

  • SHA256

    f1c36919c8f20bc80d3538fd30808d8fa80768577e4d41575728d31a7480bb69

  • SHA512

    602ce7bd4d93e2f0e0d382021be5860138ce1d5a9f4a7b7dc3b05e1257a2e724714a1b6eb185120170cb04d6627461d0e3218e5d7b14a37aa9ccb10c7b0c0529

  • SSDEEP

    768:UEEmoQDj/xnMp+yptndwe/PWQtOOtEvwDpjIm8lB4dCOBy/cMcls6z:ZzFbxmLPWQMOtEvwDpj38lD/cMUs0

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2022-11-23_97302eada3f130412e4a00c771f6dc44_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2022-11-23_97302eada3f130412e4a00c771f6dc44_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Modifies system certificate store
      PID:2216

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    44KB

    MD5

    3598a3139d6a2cb0005946f7aee11f67

    SHA1

    f3887e1444f06539427183fb74444cb270dee965

    SHA256

    033324006d82408497e2287b159aca48c542be626abc9fb4f59a6cb284e775a5

    SHA512

    b02b22f45a5799e8933fcb4549c5ebe00e7fbd4875ba4307fd69f70387873b63a41dcdd84d401d6e19bd78d75db36f7c63c1d4d9f8f42cc2130aad748645b3f1

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    44KB

    MD5

    3598a3139d6a2cb0005946f7aee11f67

    SHA1

    f3887e1444f06539427183fb74444cb270dee965

    SHA256

    033324006d82408497e2287b159aca48c542be626abc9fb4f59a6cb284e775a5

    SHA512

    b02b22f45a5799e8933fcb4549c5ebe00e7fbd4875ba4307fd69f70387873b63a41dcdd84d401d6e19bd78d75db36f7c63c1d4d9f8f42cc2130aad748645b3f1

  • memory/2216-142-0x0000000000000000-mapping.dmp

  • memory/2216-147-0x00000000004E0000-0x00000000004E6000-memory.dmp

    Filesize

    24KB

  • memory/2216-153-0x00000000004C0000-0x00000000004C6000-memory.dmp

    Filesize

    24KB

  • memory/3060-132-0x0000000000501000-0x0000000000504000-memory.dmp

    Filesize

    12KB

  • memory/3060-133-0x0000000000690000-0x0000000000696000-memory.dmp

    Filesize

    24KB

  • memory/3060-134-0x00000000020E0000-0x00000000020E6000-memory.dmp

    Filesize

    24KB

  • memory/3060-140-0x0000000000660000-0x0000000000663000-memory.dmp

    Filesize

    12KB

  • memory/3060-141-0x0000000000690000-0x0000000000696000-memory.dmp

    Filesize

    24KB