Analysis
-
max time kernel
0s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 09:03 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-01_1090360d26072732ac893b6045f3a6e9_cryptolocker.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-02-01_1090360d26072732ac893b6045f3a6e9_cryptolocker.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-01_1090360d26072732ac893b6045f3a6e9_cryptolocker.exe
-
Size
126KB
-
MD5
1090360d26072732ac893b6045f3a6e9
-
SHA1
464022f6d1bbac8637a97efe5e76f4da9177afd5
-
SHA256
2a57393ee6c8be2e6f077f9fcadd9386024fa6371b42e715f459a76dbdc1f49d
-
SHA512
ec5ec095473772f4bb5f013c94eb31777fd908a73c7683d91a769356287d9a9c37b9902e3745d17cfe701c027594153c86e7fa4067ccf1c66d796c5e15281a9d
-
SSDEEP
1536:vj+jsMQMOtEvwDpj5HwYYTjipvF2hBfIuBKLUYOVbvh//K:vCjsIOtEvwDpj5H9YvQd2RQ
Malware Config
Signatures
-
Detection of CryptoLocker Variants 3 IoCs
resource yara_rule behavioral2/files/0x00070000000231f9-12.dat CryptoLocker_rule2 behavioral2/files/0x00070000000231f9-14.dat CryptoLocker_rule2 behavioral2/files/0x00070000000231f9-15.dat CryptoLocker_rule2 -
Detection of Cryptolocker Samples 3 IoCs
resource yara_rule behavioral2/files/0x00070000000231f9-12.dat CryptoLocker_set1 behavioral2/files/0x00070000000231f9-14.dat CryptoLocker_set1 behavioral2/files/0x00070000000231f9-15.dat CryptoLocker_set1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 2024-02-01_1090360d26072732ac893b6045f3a6e9_cryptolocker.exe -
Executes dropped EXE 1 IoCs
pid Process 2020 misid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1340 wrote to memory of 2020 1340 2024-02-01_1090360d26072732ac893b6045f3a6e9_cryptolocker.exe 31 PID 1340 wrote to memory of 2020 1340 2024-02-01_1090360d26072732ac893b6045f3a6e9_cryptolocker.exe 31 PID 1340 wrote to memory of 2020 1340 2024-02-01_1090360d26072732ac893b6045f3a6e9_cryptolocker.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-01_1090360d26072732ac893b6045f3a6e9_cryptolocker.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-01_1090360d26072732ac893b6045f3a6e9_cryptolocker.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\misid.exe"C:\Users\Admin\AppData\Local\Temp\misid.exe"2⤵
- Executes dropped EXE
PID:2020
-
Network
-
Remote address:8.8.8.8:53Request228.249.119.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestbestccc.comIN AResponsebestccc.comIN A103.14.121.240
-
Remote address:8.8.8.8:53Request240.121.14.103.in-addr.arpaIN PTRResponse240.121.14.103.in-addr.arpaIN PTR10314121240-static-reversegooddomainregistrycom
-
Remote address:8.8.8.8:53Request202.178.17.96.in-addr.arpaIN PTRResponse202.178.17.96.in-addr.arpaIN PTRa96-17-178-202deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestcrl.comodoca.comIN AResponsecrl.comodoca.comIN CNAMEcrl.comodoca.com.cdn.cloudflare.netcrl.comodoca.com.cdn.cloudflare.netIN A104.18.38.233crl.comodoca.com.cdn.cloudflare.netIN A172.64.149.23
-
Remote address:104.18.38.233:80RequestGET /cPanelIncCertificationAuthority.crl HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Microsoft-CryptoAPI/10.0
Host: crl.comodoca.com
ResponseHTTP/1.1 200 OK
Content-Type: application/pkix-crl
Content-Length: 59932
Connection: keep-alive
Last-Modified: Wed, 31 Jan 2024 16:54:53 GMT
ETag: "65ba7b5d-ea1c"
X-CCACDN-Mirror-ID: mscrl2
Cache-Control: max-age=14400, s-maxage=3600
Expires: Wed, 07 Feb 2024 16:54:53 GMT
X-CCACDN-Proxy-ID: mcdpinlb2
X-Frame-Options: SAMEORIGIN
CF-Cache-Status: HIT
Age: 2491
Accept-Ranges: bytes
Server: cloudflare
CF-RAY: 84e905baedcc23dc-LHR
-
Remote address:8.8.8.8:53Request23.149.64.172.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request76.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request233.38.18.104.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request79.121.231.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request86.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.134.221.88.in-addr.arpaIN PTRResponse18.134.221.88.in-addr.arpaIN PTRa88-221-134-18deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request173.178.17.96.in-addr.arpaIN PTRResponse173.178.17.96.in-addr.arpaIN PTRa96-17-178-173deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request14.227.111.52.in-addr.arpaIN PTRResponse
-
1.0kB 4.1kB 13 9
-
1.4kB 62.3kB 27 47
HTTP Request
GET http://crl.comodoca.com/cPanelIncCertificationAuthority.crlHTTP Response
200
-
73 B 159 B 1 1
DNS Request
228.249.119.40.in-addr.arpa
-
57 B 73 B 1 1
DNS Request
bestccc.com
DNS Response
103.14.121.240
-
73 B 139 B 1 1
DNS Request
240.121.14.103.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
202.178.17.96.in-addr.arpa
-
62 B 143 B 1 1
DNS Request
crl.comodoca.com
DNS Response
104.18.38.233172.64.149.23
-
72 B 134 B 1 1
DNS Request
23.149.64.172.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
76.32.126.40.in-addr.arpa
-
72 B 134 B 1 1
DNS Request
233.38.18.104.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
196.249.167.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
79.121.231.20.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
86.23.85.13.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
18.134.221.88.in-addr.arpa
-
72 B 137 B 1 1
DNS Request
173.178.17.96.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
14.227.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD52f48a912ba52708d11062901eb4c69d0
SHA1b76949fcd8e9ad26116ae6cef02bc6a0beb18917
SHA256aa4a538298bdab3ae2786429cf8d0fdc462bc80a4fd1fc124faaa982c344b2e6
SHA512c995f8d89c50275b12249762d7327f778aeeca7789a002902ed814973915a0200f4363b92ac184c0ee4f23df41792b0035b4425ce6bb759572e1d7c955bd4ebb
-
Filesize
59KB
MD59cd964c28ff85e4a892cd7f05d20f981
SHA12afbc655be67ca97d8cd18b3b1f443d4d8b84124
SHA25633efa8c814a94ef97322f6c49e75ba61c05f8458e6cef1f5af9834a0edf398b0
SHA51262a2fdc59d9eb364597a7f044851362ef2785139578d6305a0866dba6310f208f28f01449870fb1285b0f9a9156d241519a0c891fbceaa9829f66d14e3b01c90
-
Filesize
57KB
MD5adda64a6e60673a2d42acd2974669539
SHA19e612b39bec68e803fc520828b107ddf39060317
SHA2563f5ee6383a6d5845776064e2b52f895af21c87e0cfbb3472012ca2abd41310b2
SHA5122669a3f9c48e8c933bdb2ef3e31981f4cb56bdb18c1f3f89aad9e93f117c6d8c515020eb14cc9be8a2d82ef9f476667e25edad0edb6efcb63488407302f5bce2