Resubmissions

10-06-2021 11:22

210610-r1hpg5wmq2 10

10-06-2021 09:08

210610-eadbc92qha 10

Analysis

  • max time kernel
    252s
  • max time network
    267s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    10-06-2021 09:08

General

  • Target

    PremiereCrack.exe

  • Size

    89KB

  • MD5

    f7f63358ce4d52e3e73fa449b5a00f57

  • SHA1

    892b623f4f725683d0deed79a168b3a11c8c492c

  • SHA256

    f9f20ca0a61f83cd1ba52d6c5c31445900e6ed5459f85527613292db56229794

  • SHA512

    4c044f48daaf5ff82f521ed81f9132b31ab3a91aee6ed257e7d4d8c8e7281d350ab7e4aebd9e80da0c4894290c58a8c8c36e18f6a87c0fe7b560b8cb538a4f31

Malware Config

Signatures

  • InfinityLock Ransomware

    Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.

  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops file in Program Files directory 64 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PremiereCrack.exe
    "C:\Users\Admin\AppData\Local\Temp\PremiereCrack.exe"
    1⤵
    • Modifies extensions of user files
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:3952

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3952-114-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/3952-116-0x0000000004880000-0x00000000048AA000-memory.dmp

    Filesize

    168KB

  • memory/3952-117-0x00000000049C0000-0x00000000049C1000-memory.dmp

    Filesize

    4KB

  • memory/3952-118-0x0000000004F60000-0x0000000004F61000-memory.dmp

    Filesize

    4KB

  • memory/3952-119-0x00000000048D0000-0x00000000048D1000-memory.dmp

    Filesize

    4KB

  • memory/3952-120-0x0000000004B00000-0x0000000004B01000-memory.dmp

    Filesize

    4KB

  • memory/3952-121-0x0000000004970000-0x0000000004971000-memory.dmp

    Filesize

    4KB

  • memory/3952-122-0x0000000004CC0000-0x0000000004CC1000-memory.dmp

    Filesize

    4KB

  • memory/3952-123-0x0000000008120000-0x0000000008121000-memory.dmp

    Filesize

    4KB

  • memory/3952-124-0x00000000048D3000-0x00000000048D5000-memory.dmp

    Filesize

    8KB