Analysis

  • max time kernel
    107s
  • max time network
    102s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22-08-2024 03:14

General

  • Target

  • Size

    211KB

  • MD5

    b805db8f6a84475ef76b795b0d1ed6ae

  • SHA1

    7711cb4873e58b7adcf2a2b047b090e78d10c75b

  • SHA256

    f5d002bfe80b48386a6c99c41528931b7f5df736cd34094463c3f85dde0180bf

  • SHA512

    62a2c329b43d186c4c602c5f63efc8d2657aa956f21184334263e4f6d0204d7c31f86bda6e85e65e3b99b891c1630d805b70997731c174f6081ecc367ccf9416

  • SSDEEP

    1536:YoCFfC303p22fkZrRQpnqjoi7l832fbu9ZXILwVENbM:rCVC303p22sZrRQpnviB832Du9WMON

Malware Config

Signatures

  • InfinityLock Ransomware

    Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\[email protected]
    "C:\Users\Admin\AppData\Local\Temp\[email protected]"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:1256
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2380
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x4f0
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2236
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\CompressSwitch.mov"
      1⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1752
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\CompressSwitch.mov"
      1⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:552

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_OFF.GIF.ED47D280D7CD01CC4E594A33CAE59442FD13ED4781165BA2706CD0FCB94ABCC3

      Filesize

      352B

      MD5

      5a259bd2db70f27aa4eaf93d8f1f4baf

      SHA1

      44776362c694b9d0c4652986b2334d2b7cddb55d

      SHA256

      590ed4de49eac10f4ad27dd7f895a806d8beb612b326d9ce8889e8a51ce4bf8d

      SHA512

      ab9e1e3beffc9ef61e181bfbe7486fbccb35b12e866cf6da80952226857caa0edc4bc9adca267af573160cc474b45c175fe64c5361536100b56c2fa052cdc84f

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_ON.GIF.ED47D280D7CD01CC4E594A33CAE59442FD13ED4781165BA2706CD0FCB94ABCC3

      Filesize

      224B

      MD5

      392bd3eb5b81dc1c6fc5308f0678c433

      SHA1

      1358617c5432596e406657b0022b34f3e973e018

      SHA256

      304d287f7ddd96df36dd1a90fa0772b27ea9cabcb1b9b5fe27866ab85e9f2a31

      SHA512

      a82eeee472cacd198d4f5eb0b06871c11726076e73ca071e13a3e545b2dc4ddc4d1895df328e2ce929efde138447edbb37e49b3dd5f5f1e21dab9f1f746fee6d

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_F_COL.HXK.ED47D280D7CD01CC4E594A33CAE59442FD13ED4781165BA2706CD0FCB94ABCC3

      Filesize

      128B

      MD5

      2183c5478ebd3c179521ea4b80435740

      SHA1

      ac4d8b5e884870daaaa7ad16fc6d4b6fa5497e10

      SHA256

      e4a70e5855329091e148fa42a4c49c84dd139f9d4e516e879d17fba008f9c91b

      SHA512

      95e47ff444fdda5c42458365cf8ed1020ce6a110c50143451485c72fc6e2be71f0811ca375adf8d115d0ce19896b5682283840e26798fd5dc8b38349dfdb5fe7

    • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_K_COL.HXK.ED47D280D7CD01CC4E594A33CAE59442FD13ED4781165BA2706CD0FCB94ABCC3

      Filesize

      128B

      MD5

      ff2c12ed1686fb4ab630455efb68e2d4

      SHA1

      faa60e8554cfaae810d8fd0b2ea4d7e6f1afb1ed

      SHA256

      1847e4484a391385bdbe087a4c6fd4decccc609c3ebc5b960d4edd0523faac9c

      SHA512

      aa886473621b16ad1cad971982cf23179107b3070079471746fe9a4c8f9754b3546cae4325dff3f475180237ef571fe58f447100e9875a4afd06ac262ebe10cb

    • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\BUTTON.GIF.ED47D280D7CD01CC4E594A33CAE59442FD13ED4781165BA2706CD0FCB94ABCC3

      Filesize

      192B

      MD5

      f39c711dcaa818070ede04fdbca444ed

      SHA1

      76dbae5fe5c66dac0fd1cd5284e556e9e01d7217

      SHA256

      d7a5eb0842caa360122495cc963a453960020f85ad5ec496e0110fadfaa63d04

      SHA512

      a809dbc06b18d00999354e84edb43e667632e65084d534d07da3e90349dd57b0e3840bb7b16fa15034393397281c79404745d0ef0ec056f08510ae018d455ac6

    • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_OFF.GIF.ED47D280D7CD01CC4E594A33CAE59442FD13ED4781165BA2706CD0FCB94ABCC3

      Filesize

      512B

      MD5

      835bbc242c2c7cfd05616fde9c6cf9d7

      SHA1

      e0fd2aa4cea4fad1b3406da466372aceeacc68be

      SHA256

      a7c8674f511e7ae5ee09f1619d3b1823f005f5842d7d3c713423ae4438d7217a

      SHA512

      6d27960a586df39f2c2a33b2e8339db9af8d35f9234d0515992e8b5de83f2e9b39f5325e5d1a6a4046a3d066604c97194f1e7f5b2d0215dc23292273e95b84c9

    • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_ON.GIF.ED47D280D7CD01CC4E594A33CAE59442FD13ED4781165BA2706CD0FCB94ABCC3

      Filesize

      1KB

      MD5

      920a42999fd140c123bfcf4b5e793b32

      SHA1

      fbde6ffffde955394f1ad9d84f43354b88c1cad9

      SHA256

      aa0a63629d5faa5962b18e0de901d11045b832adb8e82a32be38bca07ea65bf4

      SHA512

      3e77c9944f33030b759ed3bc6bb46a81ef725660b6f336f00aa67be25d581d193bed9eb2822110676276b7fc6b12758cd9f7e67cceeb2e9645140ee08d7afbba

    • C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.NO.XML.ED47D280D7CD01CC4E594A33CAE59442FD13ED4781165BA2706CD0FCB94ABCC3

      Filesize

      816B

      MD5

      4dc41033c6cb3fe9f86317e2cefd6674

      SHA1

      deff992a33cb055757ed3587685cd94cd50a0923

      SHA256

      ec20d3f3795e91d603f8857af880d5c355a41c37b50c940825e6fff4001aa213

      SHA512

      2cf9b8a641a3f1fb9e62701823965f30c5306a7ab76549a589bfa2c500a083f3900b0b933cde210e5cbadf1772921cf38345141903994aaf8fd3039f8657758f

    • C:\Users\Admin\AppData\Roaming\vlc\ml.xspf

      Filesize

      304B

      MD5

      781602441469750c3219c8c38b515ed4

      SHA1

      e885acd1cbd0b897ebcedbb145bef1c330f80595

      SHA256

      81970dbe581373d14fbd451ac4b3f96e5f69b79645f1ee1ca715cff3af0bf20d

      SHA512

      2b0a1717d96edb47bdf0ffeb250a5ec11f7d0638d3e0a62fbe48c064379b473ca88ffbececb32a72129d06c040b107834f1004ccda5f0f35b8c3588034786461

    • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini

      Filesize

      536B

      MD5

      5fd6d8d0aa7995da217b0dcf45dd0ca0

      SHA1

      3127008cb3ced391915d0b57712a691d0c2b9ba5

      SHA256

      8dbd3960165ac911c7233c494536307aa8405cb48e451174d0eeec0b94f038e9

      SHA512

      eb3449910bc2c1facd4683a9c2d2a1b6f38aa36e1ab3197895b5ecb889f8994173db22f7d6885c716f7ee82b7b2b8841a022736a9dbd8b0c9d6ae5a956012c73

    • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini

      Filesize

      579B

      MD5

      ea67086f9f4ceaaf8ca333457550436d

      SHA1

      45631344c26009a0791171f95b6e9f5f0f8f0550

      SHA256

      557ce611fed45d4326d2f6363248e4a6cb5b382cbf493e8c943252a9dc60ea87

      SHA512

      ffa182b7175bcbbd59b1eeb99a95c935c32bb73629ce43d3b2e7bd3180915d26d516b03dc4b8b98ce4ec324d867fe134bd73a806bbc02ceb7ed5fe4d074d9b28

    • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini.lock

      Filesize

      17B

      MD5

      0e3cb483157dd23d643627f330d99c63

      SHA1

      9d687786273070d39574fb72f762037bc3d0fa3d

      SHA256

      528423268d1eb3a2132806656802c19a6bfad3d55b1b4a23712cbb4f115a11c4

      SHA512

      c8ee46f84d8f7d7839f914e3fd0fe4a37367fcd4cc09edf0708108b8b08d483765b82d8fea8db968baf8bb2f5d803f8828c0e8c663555596f9bd41df9fb1d606

    • C:\Users\Admin\AppData\Roaming\vlc\vlcrc

      Filesize

      94KB

      MD5

      7b37c4f352a44c8246bf685258f75045

      SHA1

      817dacb245334f10de0297e69c98b4c9470f083e

      SHA256

      ec45f6e952b43eddc214dba703cf7f31398f3c9f535aad37f42237c56b9b778e

      SHA512

      1e8d675b3c6c9ba257b616da268cac7f1c7a9db12ffb831ed5f8d43c0887d711c197ebc9daf735e3da9a0355bf21c2b29a2fb38a46482a2c5c8cd5628fea4c02

    • C:\Users\Admin\Desktop\OpenBackup.xlsx.ED47D280D7CD01CC4E594A33CAE59442FD13ED4781165BA2706CD0FCB94ABCC3

      Filesize

      13KB

      MD5

      ce778ea1a389becff32f856d9b32566f

      SHA1

      9618df1ede6c81e3dd6a9cf70b702b817e5d52a9

      SHA256

      20859ad9089a0efb3706bbd9c95ec5ccecaf209f41b39a40c58584496ab2a690

      SHA512

      b12b8a9dbf04b85c3de0d13f87585dd77c23ac26556bf9afbaad7ac6ab416f5a7f2554a3609431f010e12c0a33fb200f3628d14221f91ff38b9ebdbb41e2db29

    • C:\Users\Admin\Downloads\CompressSwitch.mov

      Filesize

      269KB

      MD5

      26e3eeba046d7b0fa9aa12a3dc8cc88c

      SHA1

      73e6cae47a80477891b6fb9042896c26c74f2aea

      SHA256

      8ce024d2b227ad57f4b94688a4abb13b91d9c4659598c7c4f74e9ffdb57fee16

      SHA512

      18142cebc4d8e8d5d6c2926fa671b1116b61b23e2187f4a97b404487eded2d9b229729d444077e7bd5307967954191a499ac619ce220c491ea8697cc951a7fec

    • memory/552-5380-0x000007FEF5180000-0x000007FEF528E000-memory.dmp

      Filesize

      1.1MB

    • memory/552-5377-0x000000013F110000-0x000000013F208000-memory.dmp

      Filesize

      992KB

    • memory/552-5379-0x000007FEF5490000-0x000007FEF5746000-memory.dmp

      Filesize

      2.7MB

    • memory/552-5378-0x000007FEFA980000-0x000007FEFA9B4000-memory.dmp

      Filesize

      208KB

    • memory/1256-5322-0x0000000074580000-0x0000000074C6E000-memory.dmp

      Filesize

      6.9MB

    • memory/1256-0-0x000000007458E000-0x000000007458F000-memory.dmp

      Filesize

      4KB

    • memory/1256-5323-0x0000000074580000-0x0000000074C6E000-memory.dmp

      Filesize

      6.9MB

    • memory/1256-562-0x0000000074580000-0x0000000074C6E000-memory.dmp

      Filesize

      6.9MB

    • memory/1256-1-0x0000000000FA0000-0x0000000000FDC000-memory.dmp

      Filesize

      240KB

    • memory/1256-2-0x0000000074580000-0x0000000074C6E000-memory.dmp

      Filesize

      6.9MB

    • memory/1256-561-0x000000007458E000-0x000000007458F000-memory.dmp

      Filesize

      4KB

    • memory/1752-5345-0x000007FEF4320000-0x000007FEF53D0000-memory.dmp

      Filesize

      16.7MB

    • memory/1752-5344-0x000007FEF5750000-0x000007FEF5A06000-memory.dmp

      Filesize

      2.7MB

    • memory/1752-5342-0x000000013F9B0000-0x000000013FAA8000-memory.dmp

      Filesize

      992KB

    • memory/1752-5343-0x000007FEF6700000-0x000007FEF6734000-memory.dmp

      Filesize

      208KB