Resubmissions

10-06-2021 11:22

210610-r1hpg5wmq2 10

10-06-2021 09:08

210610-eadbc92qha 10

Analysis

  • max time kernel
    253s
  • max time network
    267s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    10-06-2021 11:22

General

  • Target

    PremiereCrack.exe

  • Size

    89KB

  • MD5

    f7f63358ce4d52e3e73fa449b5a00f57

  • SHA1

    892b623f4f725683d0deed79a168b3a11c8c492c

  • SHA256

    f9f20ca0a61f83cd1ba52d6c5c31445900e6ed5459f85527613292db56229794

  • SHA512

    4c044f48daaf5ff82f521ed81f9132b31ab3a91aee6ed257e7d4d8c8e7281d350ab7e4aebd9e80da0c4894290c58a8c8c36e18f6a87c0fe7b560b8cb538a4f31

Malware Config

Signatures

  • InfinityLock Ransomware

    Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.

  • Modifies extensions of user files 8 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops file in Program Files directory 64 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 57 IoCs
  • Suspicious use of SendNotifyMessage 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PremiereCrack.exe
    "C:\Users\Admin\AppData\Local\Temp\PremiereCrack.exe"
    1⤵
    • Modifies extensions of user files
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:988
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3992
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3940

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/988-114-0x0000000000010000-0x0000000000011000-memory.dmp

      Filesize

      4KB

    • memory/988-116-0x0000000002170000-0x000000000219A000-memory.dmp

      Filesize

      168KB

    • memory/988-117-0x0000000004990000-0x0000000004991000-memory.dmp

      Filesize

      4KB

    • memory/988-118-0x0000000004F30000-0x0000000004F31000-memory.dmp

      Filesize

      4KB

    • memory/988-119-0x0000000004A30000-0x0000000004A31000-memory.dmp

      Filesize

      4KB

    • memory/988-120-0x00000000047F0000-0x00000000047F1000-memory.dmp

      Filesize

      4KB

    • memory/988-121-0x0000000004900000-0x0000000004901000-memory.dmp

      Filesize

      4KB

    • memory/988-122-0x0000000004BB0000-0x0000000004BB1000-memory.dmp

      Filesize

      4KB

    • memory/988-123-0x0000000006750000-0x0000000006751000-memory.dmp

      Filesize

      4KB

    • memory/988-124-0x00000000047F3000-0x00000000047F5000-memory.dmp

      Filesize

      8KB