Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 16:15
Behavioral task
behavioral1
Sample
Infinit Script.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Infinit Script.exe
Resource
win10v2004-20241007-en
General
-
Target
Infinit Script.exe
-
Size
10.4MB
-
MD5
abf8a77c489ba97e7d26fbc782168ace
-
SHA1
072e2b34895b65d8a84f670d1a8b75535934e326
-
SHA256
c0016afbcaaeae90bd6c926c2c74e2360380fa04ea99c3b095ad460813bb5ff7
-
SHA512
351b45d4b5a62b86f74c7ee6af8673cdc2771a497d8bf76c0de3a090f09a35e05fd81a666b9795ff5f76ae212a46ae2f870c14b9384c1e6c0a1e32d9f4f15812
-
SSDEEP
196608:5Ot+WBFec8gerzSRtUb26Xcsg6HF/Yg12N3mi0A/e1ZheiJ:5BKeHynNszl/Yg12NWi0AmVn
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
Infinit Script.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions Infinit Script.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
Infinit Script.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools Infinit Script.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Infinit Script.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Infinit Script.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Infinit Script.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
Infinit Script.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Infinit Script.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Infinit Script.exe -
Processes:
resource yara_rule behavioral1/memory/564-1-0x0000000000D10000-0x000000000178A000-memory.dmp upx -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Infinit Script.exedescription pid process Token: SeDebugPrivilege 564 Infinit Script.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Infinit Script.exe"C:\Users\Admin\AppData\Local\Temp\Infinit Script.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
PID:564