Analysis

  • max time kernel
    163s
  • max time network
    204s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 12:16

General

  • Target

    2024-01-06_cafef11faed9df212a7a873fab737ce9_cryptolocker.exe

  • Size

    119KB

  • MD5

    cafef11faed9df212a7a873fab737ce9

  • SHA1

    483b1e7f6b7b52506f62aa8b23d0a2d01e77f699

  • SHA256

    9269184ad048fad256cfcfb1eb4dcfff7d28879ac6ee7a4b66ba503949b0fdd5

  • SHA512

    7c41a5ba1585134db9f885c0fbb2a94dac7c7f1e52066a84f9ea8cbdbc5a52140f45c6973af6602720a446e07dac123aeb4919d88e8ea64d2a0daeae82958494

  • SSDEEP

    768:gUQz7yVEhs9+4T/1bytOOtEvwDpjNbZ7uyA36S7MpxRIIXVe3mU9TYwlOBTZu:gUj+AIMOtEvwDpjNbwQEIPlemUhYpu

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-06_cafef11faed9df212a7a873fab737ce9_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-06_cafef11faed9df212a7a873fab737ce9_cryptolocker.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4092
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies system certificate store
      PID:4372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0255CEC2C51D081EFF40366512890989_8139DA8AF71D2AC8E295A42D0C1D413B

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0255CEC2C51D081EFF40366512890989_8139DA8AF71D2AC8E295A42D0C1D413B

    Filesize

    400B

    MD5

    46465149a828d2e1ba394343d98fa3ce

    SHA1

    5fc93513ed889883c684dfe2a8e9b50e32ada8c0

    SHA256

    387a1f161c2a99f8bcd17d474bbf46f2c58001f4a27cf2a89b68ea2cd10655b6

    SHA512

    8cefea99351daf3536eb2600fda95390f8abf68a7d9259de67e3df2815462b8b87be756075c8c542981cb32082bbb35ebb0907df1b5903af19f9712e551337a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0255CEC2C51D081EFF40366512890989_8139DA8AF71D2AC8E295A42D0C1D413B

    Filesize

    400B

    MD5

    979e6bd0ac4332aa7b5a751eb9bd44dc

    SHA1

    274dfb839e3ee52a2112294e55ea88575bee41c3

    SHA256

    4fbc8ec7cef8785b69e4026ed0b02b7359154bb7898f1576bc77d8f1a11807d6

    SHA512

    ddc24a75a015a85de01564469339f75dbf5bd42e1f0c61f9c6dc5ecdd1ad204c0729948518d1f2a5d26d1af05211a1063fa94134ece793efe087663a9f53b787

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    120KB

    MD5

    bd04823ecd4e1af976a214562fc778f3

    SHA1

    44e75a54569719b404a32fd4d526c23275f351c9

    SHA256

    9c29427c8fa81c244505d70d3fa1ba6a890e02ba48b68c22736547d5e7f5d936

    SHA512

    f0cce8b3a3e913c1e507956764b4bcda087fbec4254c219667a409067e827fb0e50d39f01bb4605e2e29fb681d2812350aaf994931b6ad4e942228a0f0ca304b

  • C:\Users\Admin\AppData\Local\Temp\misids.exe

    Filesize

    315B

    MD5

    a34ac19f4afae63adc5d2f7bc970c07f

    SHA1

    a82190fc530c265aa40a045c21770d967f4767b8

    SHA256

    d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3

    SHA512

    42e53d96e5961e95b7a984d9c9778a1d3bd8ee0c87b8b3b515fa31f67c2d073c8565afc2f4b962c43668c4efa1e478da9bb0ecffa79479c7e880731bc4c55765

  • memory/4092-0-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB

  • memory/4092-1-0x0000000000620000-0x0000000000626000-memory.dmp

    Filesize

    24KB

  • memory/4092-2-0x0000000000650000-0x0000000000656000-memory.dmp

    Filesize

    24KB

  • memory/4372-17-0x0000000000510000-0x0000000000516000-memory.dmp

    Filesize

    24KB

  • memory/4372-21-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB