Resubmissions

09-10-2023 22:49

231009-2ry4hsba26 10

06-03-2021 22:23

210306-pfhc83235s 10

05-06-2020 02:52

200605-jqylqtyzss 10

Analysis

  • max time kernel
    150s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    06-03-2021 22:23

General

  • Target

    drpbx.exe

  • Size

    125KB

  • MD5

    7fab69dcc9fbee7ca91bef27dc551f63

  • SHA1

    fe272f074373e80e2a00144e0fcc4de6e68cf0e3

  • SHA256

    6f94e5747ba1aaa2bb666704ee65b37aac8aff47dbc321be2b607d47dd695e8f

  • SHA512

    ac87841efd28941ee4b13142602b6f91a43b29136236d78ccde1ba838d453c9d9de5ab94ced8eaddb426f1b569ee8a3f593fdae04f02984b7fc337bccd0b3ae8

Malware Config

Signatures

  • Jigsaw Ransomware

    Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.

  • Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies extensions of user files 1 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\drpbx.exe
    "C:\Users\Admin\AppData\Local\Temp\drpbx.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe
      "C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\AppData\Local\Temp\drpbx.exe
      2⤵
      • Executes dropped EXE
      • Modifies extensions of user files
      • Drops file in Program Files directory
      PID:2112
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Suspicious use of NtCreateProcessExOtherParentProcess
    • Checks SCSI registry key(s)
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3560
  • C:\Windows\system32\werfault.exe
    werfault.exe /h /shared Global\79ecef5938984a3c9c83e4f773e06057 /t 2188 /p 2112
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2488
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xc8,0xcc,0xd0,0xa4,0xd4,0x7ff8247b6e00,0x7ff8247b6e10,0x7ff8247b6e20
      2⤵
        PID:2752

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    System Information Discovery

    3
    T1082

    Query Registry

    2
    T1012

    Peripheral Device Discovery

    1
    T1120

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe
      MD5

      7fab69dcc9fbee7ca91bef27dc551f63

      SHA1

      fe272f074373e80e2a00144e0fcc4de6e68cf0e3

      SHA256

      6f94e5747ba1aaa2bb666704ee65b37aac8aff47dbc321be2b607d47dd695e8f

      SHA512

      ac87841efd28941ee4b13142602b6f91a43b29136236d78ccde1ba838d453c9d9de5ab94ced8eaddb426f1b569ee8a3f593fdae04f02984b7fc337bccd0b3ae8

    • C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe
      MD5

      7fab69dcc9fbee7ca91bef27dc551f63

      SHA1

      fe272f074373e80e2a00144e0fcc4de6e68cf0e3

      SHA256

      6f94e5747ba1aaa2bb666704ee65b37aac8aff47dbc321be2b607d47dd695e8f

      SHA512

      ac87841efd28941ee4b13142602b6f91a43b29136236d78ccde1ba838d453c9d9de5ab94ced8eaddb426f1b569ee8a3f593fdae04f02984b7fc337bccd0b3ae8

    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat
      MD5

      7e14ee65865d86bf5f846a2559cbba7d

      SHA1

      3c0a8b1ef68f0d726cabc6b100e622be82cb4069

      SHA256

      5328c968651001725e6f1cb7dd79105cf04f2270b0679b897caeae2d6811f9fa

      SHA512

      b0cb66cfd310d6bb2c7b9ec60d72b0763a9f8df99c9e19aec73fc6676de755bd7febbabf34b0ef22e643987e70bdf27d7831f6841cee198686f59164c121a3fa

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\drpbx.exe.log
      MD5

      6a0f54467260893b55f9d04c3bad702c

      SHA1

      177b81fe0d1f2635804306c25e622cc546bbef38

      SHA256

      74657b15056a650a40c348f59a214432828d761c1ee5f30e222af86f445e5f31

      SHA512

      6a70e703ecb8b2d46cce99002e31411eaeb2578062dd65378ed9c0a5d53ed2469b9befedd6f7b091bc0192b7152524a72cbf7cd9d611961f7a8946e8434c751e

    • C:\Users\Admin\AppData\Roaming\Frfx\firefox.exe
      MD5

      7fab69dcc9fbee7ca91bef27dc551f63

      SHA1

      fe272f074373e80e2a00144e0fcc4de6e68cf0e3

      SHA256

      6f94e5747ba1aaa2bb666704ee65b37aac8aff47dbc321be2b607d47dd695e8f

      SHA512

      ac87841efd28941ee4b13142602b6f91a43b29136236d78ccde1ba838d453c9d9de5ab94ced8eaddb426f1b569ee8a3f593fdae04f02984b7fc337bccd0b3ae8

    • memory/2112-10-0x00000000009A4000-0x00000000009A5000-memory.dmp
      Filesize

      4KB

    • memory/2112-8-0x00007FF81EAB0000-0x00007FF81F450000-memory.dmp
      Filesize

      9.6MB

    • memory/2112-9-0x00000000009A0000-0x00000000009A2000-memory.dmp
      Filesize

      8KB

    • memory/2112-4-0x0000000000000000-mapping.dmp
    • memory/2112-12-0x00000000009A8000-0x00000000009AA000-memory.dmp
      Filesize

      8KB

    • memory/2112-13-0x00000000009AA000-0x00000000009AF000-memory.dmp
      Filesize

      20KB

    • memory/2488-15-0x000001F7D0D50000-0x000001F7D0D51000-memory.dmp
      Filesize

      4KB

    • memory/2488-14-0x000001F7D0D50000-0x000001F7D0D51000-memory.dmp
      Filesize

      4KB

    • memory/2752-17-0x0000000000000000-mapping.dmp
    • memory/3008-2-0x00007FF81EAB0000-0x00007FF81F450000-memory.dmp
      Filesize

      9.6MB

    • memory/3008-3-0x0000000000B40000-0x0000000000B42000-memory.dmp
      Filesize

      8KB