Analysis

  • max time kernel
    119s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06-08-2024 09:33

General

  • Target

  • Size

    211KB

  • MD5

    b805db8f6a84475ef76b795b0d1ed6ae

  • SHA1

    7711cb4873e58b7adcf2a2b047b090e78d10c75b

  • SHA256

    f5d002bfe80b48386a6c99c41528931b7f5df736cd34094463c3f85dde0180bf

  • SHA512

    62a2c329b43d186c4c602c5f63efc8d2657aa956f21184334263e4f6d0204d7c31f86bda6e85e65e3b99b891c1630d805b70997731c174f6081ecc367ccf9416

  • SSDEEP

    1536:YoCFfC303p22fkZrRQpnqjoi7l832fbu9ZXILwVENbM:rCVC303p22sZrRQpnviB832Du9WMON

Malware Config

Signatures

  • InfinityLock Ransomware

    Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\[email protected]
    "C:\Users\Admin\AppData\Local\Temp\[email protected]"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:2320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_OFF.GIF.ED47D280D7CD01CC4E594A33CAE59442FD13ED4781165BA2706CD0FCB94ABCC3

    Filesize

    352B

    MD5

    3b4c45c9f4e5ce83c657b8d837379f64

    SHA1

    9d63fbc819cfe50b6bb21d416bcd60e40a96aede

    SHA256

    f45d3029ae048ac8fc8fd3ed1450c1fc4b992746fe8275fe7b51576d7d947349

    SHA512

    77ee8759c86f9ca8f1ed4bc09f507373d707e150b15286f6c94fc2a4ced29f9613e0ab004b48a540cb4e14809609dbfff7bfc91949967939ba6b9297a1f48bd9

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_ON.GIF.ED47D280D7CD01CC4E594A33CAE59442FD13ED4781165BA2706CD0FCB94ABCC3

    Filesize

    224B

    MD5

    53a9de3a1eaac4dbc5b6f1e482eec7f1

    SHA1

    6a0bab615e3950b4d0d3394f7ede44201051a614

    SHA256

    6622457796fddbe15e7044432a69cb275cec4f0672632b3c04c1f86bf58a894a

    SHA512

    5414557813d22cecc9f8c17613c8487dc198a2b9eb4eddcbf7cc9d7564f7fa13af9553c466e7fd239b30f96d9991803376bbae5a4d7755390e77b82de4b08904

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_F_COL.HXK.ED47D280D7CD01CC4E594A33CAE59442FD13ED4781165BA2706CD0FCB94ABCC3

    Filesize

    128B

    MD5

    1dcbb6cec94d5ed8e0ee1645ecc4f5db

    SHA1

    016fa19baeeec2f304c058d93e2a40c7b96849f5

    SHA256

    761d65419cfd64e684cab9881cac7a2033e7af9705017159fa699ad71bf8f60a

    SHA512

    c6c26abacd8db2af2105a5ecc714c659daf79a8009276315aedc44191712b9721e51622d83a8773326fb9c0c0430b94f92fb5d42be33c91a8aaf88b88d0a640f

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_K_COL.HXK.ED47D280D7CD01CC4E594A33CAE59442FD13ED4781165BA2706CD0FCB94ABCC3

    Filesize

    128B

    MD5

    c37b1de4162c7bd8017d2ba4a8d7aa7c

    SHA1

    8164783781723878a2e1afef3e57578c7c500dc1

    SHA256

    60e119e6f113c611d3e454a8239c03f609110fa6f53c6f2d0cab1954b75773d4

    SHA512

    ec3e077bd9217bb070f7b92c81450c80bbcbc0c4c4ff533ecdf7c004ae4f58946fe6a52927665aa6760db310d0d0ba17de747664f4f4855d31459b8bde3a296e

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\BUTTON.GIF.ED47D280D7CD01CC4E594A33CAE59442FD13ED4781165BA2706CD0FCB94ABCC3

    Filesize

    192B

    MD5

    ba0554f5f343fd4fd1aeed4c08e1f333

    SHA1

    f916946042cb588489764c4085ea00cbb7797d80

    SHA256

    337a6131c0ff7d831052ad661a6a459605359f0eae5d0ad0cc944614f45d7633

    SHA512

    3ab4810b89cc58b0af7010755af0084a91476b75b01dbf8873bdad1fe7a609b21dd4ee72272c39ad61a89fd661e007556d27c2eb9e0a8f1e2f0dbc5fba4a040e

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_OFF.GIF.ED47D280D7CD01CC4E594A33CAE59442FD13ED4781165BA2706CD0FCB94ABCC3

    Filesize

    512B

    MD5

    c9630455fa2a261f071c7307feb75ef1

    SHA1

    f36d2f8da6e407a2e776959a3a4f72c531e41e88

    SHA256

    2e5e60f8719bb9a3ebb76f8afaf062cd57c6ea7e1f19625ae62ae2cdea567166

    SHA512

    a602f1d7fb85cf466b3bd07d3b5c9510f2392fdaebbc39d4fc22a4ebc19b6c4c1bb07f5c3e9bbedd65d9cf50ebb9c766432ece0f102e57382b222eece32eadf3

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_ON.GIF.ED47D280D7CD01CC4E594A33CAE59442FD13ED4781165BA2706CD0FCB94ABCC3

    Filesize

    1KB

    MD5

    6a7978e57120f84009fc2cf2f47ae793

    SHA1

    04c74e5073ae24cf80d79021c23c6a86d57c58d4

    SHA256

    fbb19a1c12d8579925a6adec555c881408fc2c7d923f51ec81793fd3478c8ce1

    SHA512

    cb161d2cfd6f32f088f77126222c1b72935949775dad6eb92e237b79c7c0f2c8ff2b0f75488b01852cacb1fc6f61d647b63c89c8e5ac7259127e4be1b8f0cae4

  • C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.NO.XML.ED47D280D7CD01CC4E594A33CAE59442FD13ED4781165BA2706CD0FCB94ABCC3

    Filesize

    816B

    MD5

    9d1b1c99576e15ecb8ac3d2dc47af960

    SHA1

    ad23a4a844f71f4247f01d87191248fcc7e96208

    SHA256

    e39e1512770a0a1149b6a77fb4ed783677f7e8882af9d07a7a67d0b8eea3c741

    SHA512

    8ab5302e4aad2af8cdc57040e30041d8cbd97b3ad379b5212c042bb4926c5c636f217ff98ae9546306853fb3ae6b266fbd1a38293b597446ef6cedfc42feb270

  • memory/2320-3158-0x000000007485E000-0x000000007485F000-memory.dmp

    Filesize

    4KB

  • memory/2320-3376-0x0000000074850000-0x0000000074F3E000-memory.dmp

    Filesize

    6.9MB

  • memory/2320-0-0x000000007485E000-0x000000007485F000-memory.dmp

    Filesize

    4KB

  • memory/2320-2-0x0000000074850000-0x0000000074F3E000-memory.dmp

    Filesize

    6.9MB

  • memory/2320-1-0x0000000000070000-0x00000000000AC000-memory.dmp

    Filesize

    240KB

  • memory/2320-5325-0x0000000074850000-0x0000000074F3E000-memory.dmp

    Filesize

    6.9MB

  • memory/2320-5326-0x0000000074850000-0x0000000074F3E000-memory.dmp

    Filesize

    6.9MB