Resubmissions
19-07-2024 15:21
240719-srpqea1dkd 1009-10-2023 22:49
231009-2rxkpagh8y 1030-03-2021 09:40
210330-ae6xfbdjpn 1030-03-2021 09:36
210330-23qa4tgj4n 1029-03-2021 16:32
210329-8v5z5a82en 10Analysis
-
max time kernel
18s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
29-03-2021 16:32
Static task
static1
Behavioral task
behavioral1
Sample
cats.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
cats.exe
Resource
win10v20201028
General
-
Target
cats.exe
-
Size
126KB
-
MD5
e0d108435c58dc9403588e4dcab68275
-
SHA1
7a7331423938020550ff3decd2e8b50b3ee5c87a
-
SHA256
61cd0131cb4bf090c5ee7761566f6f7a778e78b37d220f0506f98632a2663ee8
-
SHA512
2a5648ced91b75d928b4d71a8580c5bee75a5f27623f8c5071cd23b8cd85eaa8129ddb0aaf0a1fcca05fb1b7868a0fcd9306e9ddf2d3eaaf605c41cc7fde4a9e
Malware Config
Signatures
-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Executes dropped EXE 1 IoCs
pid Process 1500 Chrome32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Frfx\\firefox.exe" cats.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3812 wrote to memory of 1500 3812 cats.exe 75 PID 3812 wrote to memory of 1500 3812 cats.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\cats.exe"C:\Users\Admin\AppData\Local\Temp\cats.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Google (x86)\Chrome32.exe"C:\Users\Admin\AppData\Local\Google (x86)\Chrome32.exe" C:\Users\Admin\AppData\Local\Temp\cats.exe2⤵
- Executes dropped EXE
PID:1500
-