Analysis

  • max time kernel
    119s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01-09-2024 02:43

General

  • Target

  • Size

    211KB

  • MD5

    b805db8f6a84475ef76b795b0d1ed6ae

  • SHA1

    7711cb4873e58b7adcf2a2b047b090e78d10c75b

  • SHA256

    f5d002bfe80b48386a6c99c41528931b7f5df736cd34094463c3f85dde0180bf

  • SHA512

    62a2c329b43d186c4c602c5f63efc8d2657aa956f21184334263e4f6d0204d7c31f86bda6e85e65e3b99b891c1630d805b70997731c174f6081ecc367ccf9416

  • SSDEEP

    1536:YoCFfC303p22fkZrRQpnqjoi7l832fbu9ZXILwVENbM:rCVC303p22sZrRQpnviB832Du9WMON

Malware Config

Signatures

  • InfinityLock Ransomware

    Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\[email protected]
    "C:\Users\Admin\AppData\Local\Temp\[email protected]"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_OFF.GIF.11A14B216CAC0A2AC5BF857D21C7B747DBCF2633E8A8E9B9BA85866A65ADD624

    Filesize

    352B

    MD5

    950c6f0fa96ce1a1e2a2f9c2d14e154c

    SHA1

    be7728359bf3ebd6820d3bb8e0f7a60004335a26

    SHA256

    9fb17ceb0f309f38266d736fa69e9a0d7ca289444d10b52939cab07d49834b0d

    SHA512

    2c0b4d5676c1dd91c2148d4cfdb1d9eb3a563a1ce2340e17d64291ca390fd56980c98e0586a9fd7effa4f83a30d8cc101cf7e7e87a629e9723630447636b3a52

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_ON.GIF.11A14B216CAC0A2AC5BF857D21C7B747DBCF2633E8A8E9B9BA85866A65ADD624

    Filesize

    224B

    MD5

    30ba173c63b9aa6821e34b954aafbe8c

    SHA1

    d7176591a02d71f07a454333b34cb6616853f64e

    SHA256

    5822b291134e056494d8351472b2447eec287c7115cad5efbedf880e080944d8

    SHA512

    dbb84291734f4fdd0cb689271a271e533b927c66251f3cafa754b5240ee719d19ad9ed20d46d06efa5ee9c5da8160af5c004f50ca8a0588492392dba30fc46fd

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_F_COL.HXK.11A14B216CAC0A2AC5BF857D21C7B747DBCF2633E8A8E9B9BA85866A65ADD624

    Filesize

    128B

    MD5

    92d7907be6b1e4a8cf4740ee49ea039d

    SHA1

    33b63d72b2d8de246ebb9766b28a74fc9142847f

    SHA256

    c53368bdb77ac4923d50ad4f8bdf08fc0c1176129fb5dd14b217a212c834ad89

    SHA512

    d2f0386246440bd73f48e8f082c1ad59724ad5e33b1ef395e8aca7b37d09383da2fa1582876e60e8bf41c2d010f3af0a5f4250cde9c17e81f99de3bce0f97088

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_K_COL.HXK.11A14B216CAC0A2AC5BF857D21C7B747DBCF2633E8A8E9B9BA85866A65ADD624

    Filesize

    128B

    MD5

    e3267de83a0cf48bb72dafb97829f157

    SHA1

    09cb483c4f8b5c601ccb48fac75eb6c4c63a2245

    SHA256

    bdb650706301771c7eaa380b755dbc090241e2f7f568d664281de7873476d37e

    SHA512

    e84ce61f6fd8336454786d9849b2260f0ca676389b0cc11f98886189488f7e45738ed7a416f9bd0e8b04594dc67dff84eab10ddbe7d14b2f36de0bf46caa3a75

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\BUTTON.GIF.11A14B216CAC0A2AC5BF857D21C7B747DBCF2633E8A8E9B9BA85866A65ADD624

    Filesize

    192B

    MD5

    6ccb5a6bda9bb0ad37fe3ceefd928e2b

    SHA1

    261cbbe3802c76ff2a0368c17e8c24d27e334510

    SHA256

    61d4295e35b5e98e7dbdea2900a5aae539d7fd797a143e61fe4ab6b135b6fc79

    SHA512

    08a3063605305ffa1c53d5d60aa0b088d2533f0a8403c768ab93081a6d6acff15433816954709401c5ba638cb1ea779e7bd5d710af9e574c176a8333a87fdacc

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_OFF.GIF.11A14B216CAC0A2AC5BF857D21C7B747DBCF2633E8A8E9B9BA85866A65ADD624

    Filesize

    512B

    MD5

    19fae2c003cd44d7df0309d10eff9405

    SHA1

    e37a75d9c6ba2ec3514574b813546757cbbb6cff

    SHA256

    31ff9c9dc5fc44104fec0f8ad3b8ff7c33639279d81de0880d5a982845a39a3d

    SHA512

    021f14f4cac84dc754655484d41278f7a0aed5cab13ede57205101bfe1ee71fd57e2f1d67c06bcbdbad2429071116f2edb001d58bb7f692e4ade5f96b8b8129f

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_ON.GIF.11A14B216CAC0A2AC5BF857D21C7B747DBCF2633E8A8E9B9BA85866A65ADD624

    Filesize

    1KB

    MD5

    d627ebafc74e6d738ef5be2699577fbe

    SHA1

    dd2cbd656f859d12e0a02bbb46ed8664d572805a

    SHA256

    3db9b28b538013e4725aa05acd5e1c1692730e7f63c39350ab46567dbcbe091e

    SHA512

    1cfe4b52a464fee4556d5f29ce206cc706a7361c71bc0cf61c2fa64045c4813a638120a914411db40798913ebeafedd8ae1824e9c0c9c7cfabc2c0f253309a90

  • C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.NO.XML.11A14B216CAC0A2AC5BF857D21C7B747DBCF2633E8A8E9B9BA85866A65ADD624

    Filesize

    816B

    MD5

    10378995e853bd26b1e5fa74ba16098f

    SHA1

    71b9b04b1451cfc2306c0fe2e6599d4c91bc0d7b

    SHA256

    6927b0c834215d1b8eaee0548c838d44d38d6c25a7b99192fac3ba59abf73dd6

    SHA512

    85bedb2526dac02a0b957fd6ed6f06b9b4ee7e5635085731acc8f9aa685aafca33491e34f65009486457554068d62e5b803236b688feec9e91f65a61daefd35f

  • memory/2556-565-0x00000000746B0000-0x0000000074D9E000-memory.dmp

    Filesize

    6.9MB

  • memory/2556-561-0x00000000746BE000-0x00000000746BF000-memory.dmp

    Filesize

    4KB

  • memory/2556-2-0x00000000746B0000-0x0000000074D9E000-memory.dmp

    Filesize

    6.9MB

  • memory/2556-1-0x0000000000010000-0x000000000004C000-memory.dmp

    Filesize

    240KB

  • memory/2556-0-0x00000000746BE000-0x00000000746BF000-memory.dmp

    Filesize

    4KB

  • memory/2556-5346-0x00000000746B0000-0x0000000074D9E000-memory.dmp

    Filesize

    6.9MB

  • memory/2556-5347-0x00000000746B0000-0x0000000074D9E000-memory.dmp

    Filesize

    6.9MB