General
-
Target
KinitoPET - woody walk.mp3
-
Size
4.0MB
-
Sample
240719-p1n9fs1hrn
-
MD5
b6524d72afc8a3bdaadb00b4f9e12d6c
-
SHA1
03e803e40ffe8ce7482e463457ea45385a871a63
-
SHA256
d2482ad6f78127753ae2a35e3c8739b65d5c7f7c845b91e68f33c0947d830ece
-
SHA512
8178e2c4dc7aaa901dc2fbafff038ffcf41fd241a5ac7303cf05c14b2cd2b453c3cc60af7dd2e920d891e6a49742d18e732324d34ccdd436b92bb641c4b5e70b
-
SSDEEP
98304:fpB5VOwk/domBm5otse/wMD7W4TViR+5hUKka:fqGmYe/wMOJRMT
Static task
static1
Behavioral task
behavioral1
Sample
KinitoPET - woody walk.mp3
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
KinitoPET - woody walk.mp3
-
Size
4.0MB
-
MD5
b6524d72afc8a3bdaadb00b4f9e12d6c
-
SHA1
03e803e40ffe8ce7482e463457ea45385a871a63
-
SHA256
d2482ad6f78127753ae2a35e3c8739b65d5c7f7c845b91e68f33c0947d830ece
-
SHA512
8178e2c4dc7aaa901dc2fbafff038ffcf41fd241a5ac7303cf05c14b2cd2b453c3cc60af7dd2e920d891e6a49742d18e732324d34ccdd436b92bb641c4b5e70b
-
SSDEEP
98304:fpB5VOwk/domBm5otse/wMD7W4TViR+5hUKka:fqGmYe/wMOJRMT
-
InfinityLock Ransomware
Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.
-
Modifies WinLogon for persistence
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Event Triggered Execution: Image File Execution Options Injection
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
2Image File Execution Options Injection
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Safe Mode Boot
1Indicator Removal
2File Deletion
2Modify Registry
5