Analysis

  • max time kernel
    64s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 18:39

General

  • Target

    2022-11-23_b8aa6566c33f213f96f97a398466bd93_cryptolocker.exe

  • Size

    68KB

  • MD5

    b8aa6566c33f213f96f97a398466bd93

  • SHA1

    db619b45f3f2fd3f1daf2fc92e3da46b4f7556ea

  • SHA256

    5a9cfb382c26c8e28f51fbace8df49871d8d4347c1c41e0c0c59272bdd31406b

  • SHA512

    380c770c3f99a557e3d3427fd03b064be3b54ed230bea50c573f9823d54325fb25eea422912346c1622148f467c16ace390939f8d1ab1ceb8bdabca39189062a

  • SSDEEP

    768:XS5nQJ24LR1bytOOtEvwDpjNbZ7uyA36S7MpxRXrZSUfFKi:i5nkFGMOtEvwDpjNbwQEI8Usi

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2022-11-23_b8aa6566c33f213f96f97a398466bd93_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2022-11-23_b8aa6566c33f213f96f97a398466bd93_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4916
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Modifies system certificate store
      PID:540

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    68KB

    MD5

    6bac42425a438d26e719b62663e1c530

    SHA1

    f385f06c1334b192fa20838b50dac849c605341b

    SHA256

    a99dbb220d8fdffd1c90b7653a9e1b7c101572110a0cdada2138a9ad0c28f745

    SHA512

    49cfb036c36b06ac7ba2eb2764bfeea41f12cfb177f0c2de3b0c85a85dffc58e35f4a5623bdb47a9203dd2e7464b7ed1e3df8220209e7e41ed87c62a7fabfe4b

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    68KB

    MD5

    6bac42425a438d26e719b62663e1c530

    SHA1

    f385f06c1334b192fa20838b50dac849c605341b

    SHA256

    a99dbb220d8fdffd1c90b7653a9e1b7c101572110a0cdada2138a9ad0c28f745

    SHA512

    49cfb036c36b06ac7ba2eb2764bfeea41f12cfb177f0c2de3b0c85a85dffc58e35f4a5623bdb47a9203dd2e7464b7ed1e3df8220209e7e41ed87c62a7fabfe4b

  • memory/540-140-0x0000000000000000-mapping.dmp

  • memory/540-145-0x0000000000740000-0x0000000000746000-memory.dmp

    Filesize

    24KB

  • memory/540-153-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/540-152-0x0000000000690000-0x0000000000696000-memory.dmp

    Filesize

    24KB

  • memory/4916-132-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB

  • memory/4916-133-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/4916-134-0x0000000000640000-0x0000000000646000-memory.dmp

    Filesize

    24KB

  • memory/4916-146-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/4916-144-0x0000000000500000-0x000000000050F000-memory.dmp

    Filesize

    60KB