Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
06-03-2021 22:16
Static task
static1
Behavioral task
behavioral1
Sample
Compito matematica.pdf.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Compito matematica.pdf.exe
Resource
win10v20201028
General
-
Target
Compito matematica.pdf.exe
-
Size
606KB
-
MD5
4e890ba5a4f6fd63727c0005daa654dd
-
SHA1
e9ade30c93942c3f5928522552dd01eb25a9e9db
-
SHA256
e1c7d34fc0138d018f9e947af3dac7ec4d0fe9751dd1bc4424b185a92ca4bc51
-
SHA512
177badec70b21ed1b94a8a235535249c94b72e21fc62bae1e8c32e44b9495006687a2ef7545256ddaa2c167d870515de45e9aea524e3081135fa901532af6477
Malware Config
Signatures
-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Executes dropped EXE 1 IoCs
pid Process 1012 drpbx.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\RegisterWrite.raw.math drpbx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3341490333-719741536-2920803124-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Frfx\\firefox.exe" Compito matematica.pdf.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.Messaging_3.26.24002.0_x64__8wekyb3d8bbwe\Assets\BadgeLogo1.targetsize-24.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\small\dm_16x11.png drpbx.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-api-search_zh_CN.jar drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_16.511.8780.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.contrast-black_targetsize-64.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteMediumTile.scale-200.png drpbx.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-core-io-ui_ja.jar drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\themes\dark\nub.png.math drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.10252.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-black\AppPackageBadgeLogo.scale-125_contrast-black.png drpbx.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-ui_ja.jar.math drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\icons.png.math drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\nb-no\PlayStore_icon.svg.math drpbx.exe File created C:\Program Files\7-Zip\Lang\bn.txt.math drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.16112.11621.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-48.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.16112.11601.0_neutral_resources.scale-150_8wekyb3d8bbwe\Assets\contrast-white\Logo.scale-150_contrast-white.png drpbx.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\CancelFluent.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-black\SmallTile.scale-125.png drpbx.exe File created C:\Program Files\7-Zip\Lang\af.txt.math drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\8498_40x40x32.png drpbx.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ApothecaryLetter.dotx drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.10252.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageAppList.targetsize-16_contrast-white.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteMediumTile.scale-100.png drpbx.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] drpbx.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ca-es\ui-strings.js drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\GenericMailWideTile.scale-200.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Themes\Beach\beach_12c.png drpbx.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\bg_pattern_RHP.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Messaging_3.26.24002.0_neutral_split.scale-150_8wekyb3d8bbwe\Assets\StoreLogo.scale-150.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_4.5.6.0_x64__8wekyb3d8bbwe\Content\holoLens\en-US\doc_offline_wifi.xml drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Emoticons\small\rofl.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\TrafficHub\contrast-black\SmallTile.scale-100.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\contrast-black\WideTile.scale-100.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\Assets\Resources\cursorXBOX_normal.png drpbx.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.browser_5.5.0.165303.jar drpbx.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-sampler.jar drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\AppxManifest.xml drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_1.4.101.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\Square310x310Logo.scale-100.png drpbx.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogo.scale-140.png.math drpbx.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsStore_11701.1001.87.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\SplashScreen.scale-100.png drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\themes\dark\hscroll-thumb.png.math drpbx.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\core_icons_fw.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Assets\SkypeAppList.targetsize-32_contrast-white.png drpbx.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\inline-error-1x.png drpbx.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\ja-jp\ui-strings.js drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_4.5.6.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-256_altform-unplated_contrast-black.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\MainPageState2\freecell_bp_920.jpg drpbx.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\back-arrow-down.svg.math drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\en-il\ui-strings.js.math drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1702.312.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-30_altform-unplated.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1702.301.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-black_targetsize-96_altform-unplated.png drpbx.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogo.contrast-black_scale-180.png.math drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Themes\Classic\classic_1d.png drpbx.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ro-ro\ui-strings.js drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1702.301.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-black_targetsize-64.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNotePageLargeTile.scale-100.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-white\LargeTile.scale-125_contrast-white.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Arkadium.Win10.DailyChallenges\Assets\PrizeHistory\awards_diamond.png drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\rhp\exportpdf-rna-tool-view.js.math drpbx.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\zh-tw\PlayStore_icon.svg drpbx.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\js\controllers.js drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\root\ui-strings.js.math drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\warning.gif.math drpbx.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-sampler.jar drpbx.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-threaddump.xml drpbx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3396 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3396 taskmgr.exe Token: SeSystemProfilePrivilege 3396 taskmgr.exe Token: SeCreateGlobalPrivilege 3396 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe 3396 taskmgr.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4684 wrote to memory of 1012 4684 Compito matematica.pdf.exe 75 PID 4684 wrote to memory of 1012 4684 Compito matematica.pdf.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\Compito matematica.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Compito matematica.pdf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe"C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\AppData\Local\Temp\Compito?matematica.pdf.exe2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops file in Program Files directory
PID:1012
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3396