Analysis

  • max time kernel
    615s
  • max time network
    616s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    20-02-2024 12:38

General

  • Target

    InfinityCrypt.exe

  • Size

    211KB

  • MD5

    b805db8f6a84475ef76b795b0d1ed6ae

  • SHA1

    7711cb4873e58b7adcf2a2b047b090e78d10c75b

  • SHA256

    f5d002bfe80b48386a6c99c41528931b7f5df736cd34094463c3f85dde0180bf

  • SHA512

    62a2c329b43d186c4c602c5f63efc8d2657aa956f21184334263e4f6d0204d7c31f86bda6e85e65e3b99b891c1630d805b70997731c174f6081ecc367ccf9416

  • SSDEEP

    1536:YoCFfC303p22fkZrRQpnqjoi7l832fbu9ZXILwVENbM:rCVC303p22sZrRQpnviB832Du9WMON

Malware Config

Signatures

  • InfinityLock Ransomware

    Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.

  • Drops file in Program Files directory 64 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\InfinityCrypt.exe
    "C:\Users\Admin\AppData\Local\Temp\InfinityCrypt.exe"
    1⤵
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:3020

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_OFF.GIF.8AA64E31B9728EC45611937923B3103590456B452D2BA8EA3EB5AD77D10833F8
    Filesize

    352B

    MD5

    056e36db4b4d10af55b8ce731ed3c890

    SHA1

    eb86ae1a9b59ce491dbb232f19cb44b2bcba14ba

    SHA256

    a2156275f709bb50b4dfab79cb66c179972a8962fd94f1cd9bd50347d208d3a3

    SHA512

    7ee8b31ce157c2ef95224cd878446f0dca3a3de0d424032d1c67e7855f97f72a5aae10e8324864e906a46de15fd5d4c050567d3d51855ca5662271c5ab049ddc

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_ON.GIF.8AA64E31B9728EC45611937923B3103590456B452D2BA8EA3EB5AD77D10833F8
    Filesize

    224B

    MD5

    b02033b5dac49624a9aafc76482f6d20

    SHA1

    69f2b0eab06f30c6311736f7711c41e1ede49581

    SHA256

    ca219adf420ac7fb91b151d4ff199c66a29486060bebb347f93178620973c9f1

    SHA512

    bc4b2e42c078d515699d1b7d9aff9350092fd33d6a94dc3c332efe78b9bd4424d3576bd420cc744ac518c2ae6460d1aae00833c2c7ba85bb2b475a8e7ec11950

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_F_COL.HXK.8AA64E31B9728EC45611937923B3103590456B452D2BA8EA3EB5AD77D10833F8
    Filesize

    128B

    MD5

    44d02d76b832e70a1285da69da4e025c

    SHA1

    8e606dc064a681ce81155ae3b20993ccabe723df

    SHA256

    e41d0df4ae215e648d9c1e86292b1f041de0d214f4cc30b9f13df12e808f5abb

    SHA512

    3adf8950f2c609a8cad3cbacb4e847d3be256af21f8568a459d77f078989f28bbfdd9e787306e5b7bac6d3ba9e4f2dcb0020b2bc229134632f8684fe9cdf9792

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_K_COL.HXK.8AA64E31B9728EC45611937923B3103590456B452D2BA8EA3EB5AD77D10833F8
    Filesize

    128B

    MD5

    062cb4524dd64ddb41ef12935852e2e8

    SHA1

    ca8c4314904a5fe70f09045f346b54affd003bfa

    SHA256

    28fc54c505b3fa4ff98b31d9c4a349af7daf9a32198d874837c495062e9aaea7

    SHA512

    84963ee0a6db8a2216104d1dee3584b38caeef4494ae94bcf45964913d972f9f36ccaf0bc862e6a3723204f3454159bb0c3fbece68323356a2b04742c9817d68

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\BUTTON.GIF.8AA64E31B9728EC45611937923B3103590456B452D2BA8EA3EB5AD77D10833F8
    Filesize

    192B

    MD5

    4a407ec2014628de7f22b3940e59289a

    SHA1

    03da971e7f048e00ceae2d488c1c201601a21763

    SHA256

    7b93c415517487e4a4011110ab15072540d1aa85ce2e33b0f5000b56ee4f6146

    SHA512

    8eca1ad759d207d7a3400530ed97d63aa510f7e875c3519a9e85493d5c8bdc77165c118a1ec6bbaed1cad8dd14741a2a42b8242da4de1856c522b5080befe766

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_OFF.GIF.8AA64E31B9728EC45611937923B3103590456B452D2BA8EA3EB5AD77D10833F8
    Filesize

    512B

    MD5

    75d653428c14cc37836f354760ec8be1

    SHA1

    fef8b1825b6d91e78e649488db2346dbaa1f75e6

    SHA256

    f15b3b6198c6db39c9c94c09e772e23e4010a63842fe2c79617c467acb8b4f6a

    SHA512

    5452bfd031c488b35a3ec243bb23057150b580a8e7d60bbf7bf0dee874a5dbd309f9b4c4e2d54b8fcaf89e5bcd3d2aafe8c05c3a8a1b8e5873e3c894f5e7ccf0

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_ON.GIF.8AA64E31B9728EC45611937923B3103590456B452D2BA8EA3EB5AD77D10833F8
    Filesize

    1KB

    MD5

    10b64bf1b41a46cf5a1ff03709522288

    SHA1

    7defc3a4d55a306e0edc6570d1c213450642181a

    SHA256

    dab74f9c31157619d1cc3f5f23021d9efeca9d8fe06e82cfdb8b61528e30a22c

    SHA512

    b00448aced6a1eaf2a7d3a4ca8b14517ea41bd782cc30db3236149e3c381c5b09e82c0f1364dba0e4d49f8bdd359f984d884eaac4dff52c2bb3ab8c3060be26b

  • C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.NO.XML.8AA64E31B9728EC45611937923B3103590456B452D2BA8EA3EB5AD77D10833F8
    Filesize

    816B

    MD5

    4fc9d020da9bdfec6ae7135e37bca552

    SHA1

    fa3281e74329ce8cc44412a5b7ddf249adb5d172

    SHA256

    ea0714e95d940a4bbaf1127c754eebde4adb830d220e682b2da20a2d3871ca61

    SHA512

    8eee877b15d74b5bb12c35699f7ca80c7b87238aeee4aeb6e3d77875617e9e5d99ce4ca0315b3c0e319856fb1e5ac0ac4261b3acdf192c6dcd27fbb6edbf3f0c

  • memory/3020-3086-0x0000000004E10000-0x0000000004E50000-memory.dmp
    Filesize

    256KB

  • memory/3020-3020-0x00000000745C0000-0x0000000074CAE000-memory.dmp
    Filesize

    6.9MB

  • memory/3020-2-0x0000000004E10000-0x0000000004E50000-memory.dmp
    Filesize

    256KB

  • memory/3020-1-0x00000000745C0000-0x0000000074CAE000-memory.dmp
    Filesize

    6.9MB

  • memory/3020-0-0x0000000000830000-0x000000000086C000-memory.dmp
    Filesize

    240KB

  • memory/3020-5349-0x0000000004E10000-0x0000000004E50000-memory.dmp
    Filesize

    256KB