Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    07-04-2024 02:09

General

  • Target

    InfinityCrypt.exe

  • Size

    211KB

  • MD5

    b805db8f6a84475ef76b795b0d1ed6ae

  • SHA1

    7711cb4873e58b7adcf2a2b047b090e78d10c75b

  • SHA256

    f5d002bfe80b48386a6c99c41528931b7f5df736cd34094463c3f85dde0180bf

  • SHA512

    62a2c329b43d186c4c602c5f63efc8d2657aa956f21184334263e4f6d0204d7c31f86bda6e85e65e3b99b891c1630d805b70997731c174f6081ecc367ccf9416

  • SSDEEP

    1536:YoCFfC303p22fkZrRQpnqjoi7l832fbu9ZXILwVENbM:rCVC303p22sZrRQpnviB832Du9WMON

Malware Config

Signatures

  • InfinityLock Ransomware

    Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.

  • Drops file in Program Files directory 64 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\InfinityCrypt.exe
    "C:\Users\Admin\AppData\Local\Temp\InfinityCrypt.exe"
    1⤵
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:1680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_OFF.GIF.540A1F78F287E9F987C9AF347EB62FF3B3B5F227AF6A81867BE6B5D3CCBD2849

    Filesize

    352B

    MD5

    e5f93a1d075fd78ffacea0444a3effc2

    SHA1

    cfb74a7b235882ce1798402e9c7b1d180280199c

    SHA256

    817045b90f1e29590da584ea298e054df2d70d79a9c150728708e8c6dc8a5d41

    SHA512

    7312428a21d075de7f0ea70991f4102a64a1a8f1e91cfd48c4066f158fbf9eba89087e3c6209d1c3512151f4d74ee21968c6ab8a5c7f576f2c7d069650696ab4

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_ON.GIF.540A1F78F287E9F987C9AF347EB62FF3B3B5F227AF6A81867BE6B5D3CCBD2849

    Filesize

    224B

    MD5

    b177aa4ecec3b236e165b0fadd8578ec

    SHA1

    4e74c6082539c19ede5a7a455660741fd6c3be6f

    SHA256

    1d6598c10cf8073d1eb095f557954de2fcd4324e13fea10dbc1752c92cfc4bec

    SHA512

    60e4fdfa65afee618cc98174c0fab76dc552e801b41c5221da078f9dbc3206658733da7614a4864f85171a4773bcb6176453b7b8b0df0369714a0ff37493af70

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_F_COL.HXK.540A1F78F287E9F987C9AF347EB62FF3B3B5F227AF6A81867BE6B5D3CCBD2849

    Filesize

    128B

    MD5

    23a633b2abba38fd9aa487aa304df5e4

    SHA1

    35a877c62414868a0632f3d835e888b0d922a06e

    SHA256

    85b40709ba1e2c28a04e03a5e17fe0737fcd26d5f315773633ddd6492a6e4d85

    SHA512

    79c6bc4687a8bdfc095be117d1d5692576f576a81539d141396e87b296ebf2d6ae7ada9d8c5c8864b932a9753c69fa1f1a3c5b6551aa7cb1ef01849c86197546

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_K_COL.HXK.540A1F78F287E9F987C9AF347EB62FF3B3B5F227AF6A81867BE6B5D3CCBD2849

    Filesize

    128B

    MD5

    3ddc6b93b5fcb2d6c1e8c97abe7b8c72

    SHA1

    3ccf5136165ffeee061aca6d636ab0d916c91b64

    SHA256

    7405c289d70c99ca07dad19d3553210d2284cbab58909d20fd4ff304b11d8cb7

    SHA512

    788c856430c5410de2afe4f258e05f4a5076e81644aa0ae1a98943c5225ebf10341665345435541fd470e0d6281322730129fc4ad431ce6da8499c49a9638322

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\BUTTON.GIF.540A1F78F287E9F987C9AF347EB62FF3B3B5F227AF6A81867BE6B5D3CCBD2849

    Filesize

    192B

    MD5

    cab4563fbea3eded33158c6188df90d7

    SHA1

    84146b02b105521553990064c2995945c471814c

    SHA256

    1cd1f1dbb6a0095979abf68bc223deafa540654407297ea1cb36d39c28251244

    SHA512

    17eedb7faeca4451264177b0bcd57b80ccffa3d9c8b0f03e6324df49a429fb849761f22964e96055a1254397e44a2a9c6a31766a8c2ba0d99fca467aa0ec69f8

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_OFF.GIF.540A1F78F287E9F987C9AF347EB62FF3B3B5F227AF6A81867BE6B5D3CCBD2849

    Filesize

    512B

    MD5

    a43dd94362a3e3b211c9d3fedb032bf6

    SHA1

    4a881d483e7620863aa4575eca619410e569af1b

    SHA256

    682fc65bf80907abe019937160e055ef7f2ff84e04032fd9cd440e71be8caebb

    SHA512

    c1e0c02a800a1e6145b471a8cfb766f08a123416d406265c2ae24e6e97a214d06f66bd35e90a74dededbb0a4541dd744c88b22f1f098fb1bd3e9cb92c6134d59

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_ON.GIF.540A1F78F287E9F987C9AF347EB62FF3B3B5F227AF6A81867BE6B5D3CCBD2849

    Filesize

    1KB

    MD5

    2b91b17976717a6acec6b0516d21c763

    SHA1

    8772aaf5a073595b7bbe3b203eee7e111d460baa

    SHA256

    0a47a2743ab03793c6facabf030b33c30bfcc67eb63e450aab49c71b9ca466bd

    SHA512

    2610526e6dedda6aa8a8c855d8fffda74ebbb758456505cf051bea0cf69e15a6b599aee447f986af3e25e1b3e598157a3d45ff996303b9b20b18618b49e55734

  • C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.NO.XML.540A1F78F287E9F987C9AF347EB62FF3B3B5F227AF6A81867BE6B5D3CCBD2849

    Filesize

    816B

    MD5

    90acf7f4c17748cb81520f0bcab132b1

    SHA1

    7be85e647dd30e83dbd06994cfba7e057defb367

    SHA256

    05f930ce3d7ebdbb76b895b9bc959875e53e45aba6de9bd32b650047b886136c

    SHA512

    383b912ceb2539d7936372cc6ebb0f2e4c8354a06367e36d448a61904d37f4454617e0b1524ad84219fc8ffbf43b4a476bf1e52dc24d4af40d30cbabf71051ec

  • memory/1680-2944-0x0000000004E10000-0x0000000004E50000-memory.dmp

    Filesize

    256KB

  • memory/1680-2919-0x0000000073F30000-0x000000007461E000-memory.dmp

    Filesize

    6.9MB

  • memory/1680-2-0x0000000004E10000-0x0000000004E50000-memory.dmp

    Filesize

    256KB

  • memory/1680-1-0x0000000073F30000-0x000000007461E000-memory.dmp

    Filesize

    6.9MB

  • memory/1680-0-0x0000000000E70000-0x0000000000EAC000-memory.dmp

    Filesize

    240KB

  • memory/1680-5349-0x0000000004E10000-0x0000000004E50000-memory.dmp

    Filesize

    256KB