Analysis

  • max time kernel
    121s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-01-2025 00:53

General

  • Target

  • Size

    211KB

  • MD5

    b805db8f6a84475ef76b795b0d1ed6ae

  • SHA1

    7711cb4873e58b7adcf2a2b047b090e78d10c75b

  • SHA256

    f5d002bfe80b48386a6c99c41528931b7f5df736cd34094463c3f85dde0180bf

  • SHA512

    62a2c329b43d186c4c602c5f63efc8d2657aa956f21184334263e4f6d0204d7c31f86bda6e85e65e3b99b891c1630d805b70997731c174f6081ecc367ccf9416

  • SSDEEP

    1536:YoCFfC303p22fkZrRQpnqjoi7l832fbu9ZXILwVENbM:rCVC303p22sZrRQpnviB832Du9WMON

Malware Config

Signatures

  • InfinityLock Ransomware

    Also known as InfinityCrypt. Based on the open-source HiddenTear ransomware.

  • Infinitylock family
  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\[email protected]
    "C:\Users\Admin\AppData\Local\Temp\[email protected]"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:2524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_OFF.GIF.F45C2425695CDA675327AD3C57344FD5AF55510C889639FEAF0F809807D4680D

    Filesize

    352B

    MD5

    87d62dea55f270dfcb5a3b2eb5aa50dd

    SHA1

    8d0c2b1dabc156cd06e18dc80327a4628b066967

    SHA256

    fe91f20f1b1c4e3a4b44d6f762a755f7a65cfd0e776c1cd96d86b584ea3552b1

    SHA512

    a990372196a4fd32d47166dec3852940a074b1d619e899ec5515240b2648cc86bff9d4e77dd636d825c9583d70e372b87906f94b87139021f1ab2dd2831c194b

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightYellow\TAB_ON.GIF.F45C2425695CDA675327AD3C57344FD5AF55510C889639FEAF0F809807D4680D

    Filesize

    224B

    MD5

    88e921caccbdf18fb09c57eac34cd14d

    SHA1

    7541745c1ce238a35cb1fc181759a1985370b1a8

    SHA256

    67b5441e107f07268889b5ae2f86307bb3aeb5399503942da6ff97809d49e0d4

    SHA512

    42721d6e546f45d323ce21fc80a9b202db752428b45a41608a9b601daf6fa09592d50f813e7505603fc6d71f16e9e65d54bfcd99f58ef2dbbb53945f070c1f0c

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_F_COL.HXK.F45C2425695CDA675327AD3C57344FD5AF55510C889639FEAF0F809807D4680D

    Filesize

    128B

    MD5

    266bbe1118b9cff04aa340c5ca9d56cf

    SHA1

    f3c5ee239190298ef74c3808ec41c2b3558711fd

    SHA256

    b45d5e1087075d72afd16bfd091f28ef95080090f838474fae990b64245d7718

    SHA512

    9d821771f1bf549355b1798af80ac3f427b6425e570e8398517a5f0fa2bbe81085eaeb7fa4b82e7b709895b9cd3c83d1b657d978a088e7b2d1a7ce4ae7bdf813

  • C:\Program Files (x86)\Microsoft Office\Office14\1033\INFOPATH_K_COL.HXK.F45C2425695CDA675327AD3C57344FD5AF55510C889639FEAF0F809807D4680D

    Filesize

    128B

    MD5

    436af6a7f6067f8c2d4dcbc3bfd11485

    SHA1

    78db9b489e1ae95ea2da9f604d0e392e4deba794

    SHA256

    496ff918c016ca4414f28df7a61606d6c1a7da7359863ebab1c014d01abcb7f6

    SHA512

    f4abe648487a253f77031b515e0a0e891cb3b3da47eb5eca387da8c42b87bcde8c0c6eb7db89cbd28c9d8fdcd3b18376ace622633a042b20d3a5b6ed3953e778

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\BUTTON.GIF.F45C2425695CDA675327AD3C57344FD5AF55510C889639FEAF0F809807D4680D

    Filesize

    192B

    MD5

    8f0439ad05927bcb5ff0a87198611f08

    SHA1

    5e5033595fb4c004589d197c8da03c62e4be0f81

    SHA256

    e4de2d6d25e15ce4f2ab4f01b1d0c6fad0073d6ada5c248ab5368afb3cb1b68c

    SHA512

    5bb0fbba2a04972b5d7f679776aa0c3173e7e5290679095c4a37254cf40687d6340bb3decc719135b6a9600dc8ff04bc32dca3ffd7375aea9b21ee74ca8d7791

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_OFF.GIF.F45C2425695CDA675327AD3C57344FD5AF55510C889639FEAF0F809807D4680D

    Filesize

    512B

    MD5

    53df504223ba464b12081deedef1b920

    SHA1

    34d1564fa148b3de3e74ca0b45b661d637428ff3

    SHA256

    2e6d5630b84e692e26c4f61956508b73a4f32b62d41ccd6ebb8f8f9e4aa04c56

    SHA512

    b43f14b31d7cfeebc3ca43c35a1c5fca532173cd64b2c1709d61fbcfd316584903b12f9010c14ce8568c76a2d0494a5b9d74912f5543546c47f7ce9bcf5ded98

  • C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\TAB_ON.GIF.F45C2425695CDA675327AD3C57344FD5AF55510C889639FEAF0F809807D4680D

    Filesize

    1KB

    MD5

    bf90f0639c69cbc2941e6341416936be

    SHA1

    0e4fe9ea3f5315c57b4ec36f473037f0484bee35

    SHA256

    c11e52eb5a5472f442ad05951b0178b9c50d0af67d378ec7debec3585d6e72c7

    SHA512

    a648a3a35159273da16396b755895b15ecde970fb27a0db7f2ec13c30ee12766832c6905f7b41d5d905196b45bd29e6793e75354a4aed026af6bd76467679717

  • C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.NO.XML.F45C2425695CDA675327AD3C57344FD5AF55510C889639FEAF0F809807D4680D

    Filesize

    816B

    MD5

    2d3e281f0c6a3a9a2b973ea81523a301

    SHA1

    774941ffbf052512c7257ad98f668ae95575c11a

    SHA256

    8c7ecb7c814675f2ab1e71c813120e38b12f068bae384893155f974af0d741d1

    SHA512

    15d62654befc2acbcf866a0c15d54362c96a5b64cdd898fbd255de5bd95db1c43212be0457ab036ca8ed313a63ad3acde491541f5ccb02eff09274e4f6d64f57

  • memory/2524-564-0x0000000074E80000-0x000000007556E000-memory.dmp

    Filesize

    6.9MB

  • memory/2524-561-0x0000000074E8E000-0x0000000074E8F000-memory.dmp

    Filesize

    4KB

  • memory/2524-2-0x0000000074E80000-0x000000007556E000-memory.dmp

    Filesize

    6.9MB

  • memory/2524-1-0x0000000000E20000-0x0000000000E5C000-memory.dmp

    Filesize

    240KB

  • memory/2524-0-0x0000000074E8E000-0x0000000074E8F000-memory.dmp

    Filesize

    4KB

  • memory/2524-5339-0x0000000074E80000-0x000000007556E000-memory.dmp

    Filesize

    6.9MB

  • memory/2524-5340-0x0000000074E80000-0x000000007556E000-memory.dmp

    Filesize

    6.9MB