Analysis

  • max time kernel
    103s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    09-05-2021 10:26

General

  • Target

    123.exe

  • Size

    89KB

  • MD5

    3822d0484ec81d615a0913c398ad1f83

  • SHA1

    b7bd3e90724189c7316b82a70ce85e0a91855089

  • SHA256

    27a1f89ce5a37815010c8411dddec85d5d66e81a957ad722fbd2dc64f99651c8

  • SHA512

    d103abe81ef9bba19a3f21c8a2742b6a6dad2d147bb440e81b1f17b1d0f67fc3dfa4c33c84ec8b7ca1b107fbd91535ee588d29bded615cff58685eb611665fe8

Malware Config

Signatures

  • InfinityLock Ransomware

    Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.

  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops file in Program Files directory 64 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\123.exe
    "C:\Users\Admin\AppData\Local\Temp\123.exe"
    1⤵
    • Modifies extensions of user files
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:1632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1632-60-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/1632-62-0x0000000004920000-0x0000000004921000-memory.dmp

    Filesize

    4KB

  • memory/1632-63-0x00000000003B0000-0x00000000003DA000-memory.dmp

    Filesize

    168KB

  • memory/1632-64-0x0000000004925000-0x0000000004936000-memory.dmp

    Filesize

    68KB