Analysis
-
max time kernel
128s -
max time network
97s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
01-05-2020 14:11
Static task
static1
Behavioral task
behavioral1
Sample
rBlbqI2.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
rBlbqI2.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
rBlbqI2.exe
-
Size
291KB
-
MD5
2fec9bf50de5395f799b23a1099b10d6
-
SHA1
6000969e75d7d7a3fa1b908bdb9d5daeb5f2534e
-
SHA256
df049efbfa7ac0b76c8daff5d792c550c7a7a24f6e9e887d01a01013c9caa763
-
SHA512
5f6885fb1940ee4f84507e2b7929f637d8f264a5c77329aeae31803b772608ea93370177017f90f6f8d8bc9e0b30eb8607ed120d4ead68104fd70feec71a9ab8
Score
10/10
Malware Config
Signatures
-
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly rBlbqI2.exe File created C:\Windows\assembly\Desktop.ini rBlbqI2.exe File opened for modification C:\Windows\assembly\Desktop.ini rBlbqI2.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini rBlbqI2.exe File opened for modification C:\Windows\assembly\Desktop.ini rBlbqI2.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1356 rBlbqI2.exe Token: SeDebugPrivilege 1828 drpbx.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1356 wrote to memory of 1828 1356 rBlbqI2.exe 68 PID 1356 wrote to memory of 1828 1356 rBlbqI2.exe 68 PID 1356 wrote to memory of 1828 1356 rBlbqI2.exe 68 -
Executes dropped EXE 1 IoCs
pid Process 1828 drpbx.exe -
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Frfx\\firefox.exe" rBlbqI2.exe -
Jigsaw
Ransomware family first created in 2016. Named based on wallpaper set after infection.
Processes
-
C:\Users\Admin\AppData\Local\Temp\rBlbqI2.exe"C:\Users\Admin\AppData\Local\Temp\rBlbqI2.exe"1⤵
- Drops file in Windows directory
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- Adds Run entry to start application
PID:1356 -
C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe"C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\AppData\Local\Temp\rBlbqI2.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Executes dropped EXE
PID:1828
-