Resubmissions

10-06-2021 11:22

210610-r1hpg5wmq2 10

10-06-2021 09:08

210610-eadbc92qha 10

Analysis

  • max time kernel
    244s
  • max time network
    245s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    10-06-2021 09:08

General

  • Target

    PremiereCrack.exe

  • Size

    89KB

  • MD5

    f7f63358ce4d52e3e73fa449b5a00f57

  • SHA1

    892b623f4f725683d0deed79a168b3a11c8c492c

  • SHA256

    f9f20ca0a61f83cd1ba52d6c5c31445900e6ed5459f85527613292db56229794

  • SHA512

    4c044f48daaf5ff82f521ed81f9132b31ab3a91aee6ed257e7d4d8c8e7281d350ab7e4aebd9e80da0c4894290c58a8c8c36e18f6a87c0fe7b560b8cb538a4f31

Malware Config

Signatures

  • InfinityLock Ransomware

    Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.

  • Modifies extensions of user files 4 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops file in Program Files directory 64 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PremiereCrack.exe
    "C:\Users\Admin\AppData\Local\Temp\PremiereCrack.exe"
    1⤵
    • Modifies extensions of user files
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:1032

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1032-60-0x0000000000D30000-0x0000000000D31000-memory.dmp

    Filesize

    4KB

  • memory/1032-62-0x0000000004AA0000-0x0000000004AA1000-memory.dmp

    Filesize

    4KB

  • memory/1032-63-0x00000000005D0000-0x00000000005FA000-memory.dmp

    Filesize

    168KB

  • memory/1032-64-0x0000000004AA5000-0x0000000004AB6000-memory.dmp

    Filesize

    68KB