Analysis

  • max time kernel
    98s
  • max time network
    87s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    23-04-2023 16:45

General

  • Target

    InfinityCrypt.exe

  • Size

    211KB

  • MD5

    b805db8f6a84475ef76b795b0d1ed6ae

  • SHA1

    7711cb4873e58b7adcf2a2b047b090e78d10c75b

  • SHA256

    f5d002bfe80b48386a6c99c41528931b7f5df736cd34094463c3f85dde0180bf

  • SHA512

    62a2c329b43d186c4c602c5f63efc8d2657aa956f21184334263e4f6d0204d7c31f86bda6e85e65e3b99b891c1630d805b70997731c174f6081ecc367ccf9416

  • SSDEEP

    1536:YoCFfC303p22fkZrRQpnqjoi7l832fbu9ZXILwVENbM:rCVC303p22sZrRQpnviB832Du9WMON

Malware Config

Signatures

  • InfinityLock Ransomware

    Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.

  • Modifies extensions of user files 15 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Drops file in Program Files directory 64 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\InfinityCrypt.exe
    "C:\Users\Admin\AppData\Local\Temp\InfinityCrypt.exe"
    1⤵
    • Modifies extensions of user files
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:1456

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_OFF.GIF.4961EEEA9A591E2BCF9F22B6B4A7BD8B2DB75A3385936B91F1BD3206F24B7CEF

    Filesize

    352B

    MD5

    c2c5a4103adeb1908307341f8bcc33ec

    SHA1

    90d30e4c2fb485aac144634e04bae16b577fb6cd

    SHA256

    6ede2ce2cc29e6bd2db9f62164e25c8f69606deec5cc77721cb946d8742ad0bd

    SHA512

    401c0c39650f8a21cb68768ab846a0f4005515662c5f6d291b7f7786874ff9687804cd0e91e70c49905550bef44d899395ac0b60cd9f9b6adb8355aec5a37091

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_ON.GIF.4961EEEA9A591E2BCF9F22B6B4A7BD8B2DB75A3385936B91F1BD3206F24B7CEF

    Filesize

    224B

    MD5

    1976853fcff0e100bfc6e6d971eef274

    SHA1

    712287adfe3ba72abffa767497ba32cbcf7ddbf9

    SHA256

    bd688b350f3657e056fab988e0a751cd02287d9cd1fe3f91c6eae019878a7879

    SHA512

    b10f2d8efea46c5a091b83857d838b1235a1ad4953c16eff16f21a82fdd478e7fa922909b39cdf4330ad420976d43268b9e9a4ccef758150edd4a5d5e4c4aaa0

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_F_COL.HXK.4961EEEA9A591E2BCF9F22B6B4A7BD8B2DB75A3385936B91F1BD3206F24B7CEF

    Filesize

    128B

    MD5

    7a83cc62ba576be86f530961c937ab08

    SHA1

    31bda404be489d239ae0dc9cb853d6596bcc1537

    SHA256

    71aa1b2d0b171afbe6f3895a3cfe8a3f0d24570bfec5d135820b681e94da667f

    SHA512

    2b7b318ebb8a8d2d03957beb0f0b110b644d4f88243ea81acd577bd64bcb5584b017e9773b1222a9eafa3a89705f5dfbf78b6c6a876f6aaa11d22ab51bc37f2d

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_K_COL.HXK.4961EEEA9A591E2BCF9F22B6B4A7BD8B2DB75A3385936B91F1BD3206F24B7CEF

    Filesize

    128B

    MD5

    d12d1f3ab945b4e450f4b5ad62f22b03

    SHA1

    d9202ea1a7101892a797180360e283156e5d0272

    SHA256

    94adc0c88e3633ca61c4e0247f765392979d17b4150d30546e9581807c283d4a

    SHA512

    893d080cacc038bf029e09941b009952ec7647bcbaee4d8ec8d7220f18e52a60e41911759fe00b258a5b331dddfa7ba1d412d081a92396ecc520938b2ec1419a

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\BUTTON.GIF.4961EEEA9A591E2BCF9F22B6B4A7BD8B2DB75A3385936B91F1BD3206F24B7CEF

    Filesize

    192B

    MD5

    fe2625d22f23395252cbfdea30ab2663

    SHA1

    2a0a8cf947d4ad65c931aa10e2e5ad604488b330

    SHA256

    4f972224c10c3bcd8df19f919e497d22c85f2ed818d78b8961784365cf5c9e93

    SHA512

    4e050a55b7159e02adb31347116bf35ff257f73fca498bc77860409826cf8e3ce7d5f8298d676065e3c14fae6e4a01a0bcc4e92153c04b875158c337db1a3b8a

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_OFF.GIF.4961EEEA9A591E2BCF9F22B6B4A7BD8B2DB75A3385936B91F1BD3206F24B7CEF

    Filesize

    512B

    MD5

    def2a3b69c723de710c1e100bb1c274f

    SHA1

    4ae34cc24732607282ffe3adc2828dadaa4eb833

    SHA256

    a6a14848067cd46a362f0e0a80feb7f85787d64a7da40ed9a91977da150e744b

    SHA512

    f48bd6817bc1e704f9382304615d25253adfd88655c6b9f949928061398064970996f50cf7b85c1b5d56dea5414452e6f56eeea72aef998a2185d72ee8f0ad0d

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_ON.GIF.4961EEEA9A591E2BCF9F22B6B4A7BD8B2DB75A3385936B91F1BD3206F24B7CEF

    Filesize

    1KB

    MD5

    be9e50902a5ac7ba6eb6b25e08444a03

    SHA1

    5819e74282eefefa6e414ad501aa4b6229773aad

    SHA256

    d72323006cd69d59ce73319ca0b7ab807b592b50c7508ce4e497be4bf69c2a2e

    SHA512

    4cf290af9b62267be429211986e4a7875fbd80f4ce31381ff5621ec9f1d6b31a5799753a11de2bd189ee09e328e45e6d48f9711178c44da1979600267651f088

  • C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.NO.XML.4961EEEA9A591E2BCF9F22B6B4A7BD8B2DB75A3385936B91F1BD3206F24B7CEF

    Filesize

    816B

    MD5

    18c233d0f9881691e5a63fa1bcbe8f84

    SHA1

    c70f44f8ef4e148e1630baa53dfc7c0aa8dfc597

    SHA256

    e44070f52c4e61468438071441e9042050775fba62ba2b3fa13aa5ea1a18b1b9

    SHA512

    797de34716fe3f661d16d43060a429b9626ba6afacd00d2a8fb6bb7abbe9ad3aafe64787411c6755649d493108a5e537c96288e3767992d11829d615842a4e35

  • memory/1456-54-0x00000000001B0000-0x00000000001EC000-memory.dmp

    Filesize

    240KB

  • memory/1456-570-0x00000000049E0000-0x0000000004A20000-memory.dmp

    Filesize

    256KB

  • memory/1456-55-0x00000000049E0000-0x0000000004A20000-memory.dmp

    Filesize

    256KB

  • memory/1456-5374-0x00000000049E0000-0x0000000004A20000-memory.dmp

    Filesize

    256KB

  • memory/1456-5375-0x00000000049E0000-0x0000000004A20000-memory.dmp

    Filesize

    256KB