Analysis
-
max time kernel
159s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
08-04-2022 01:39
Static task
static1
Behavioral task
behavioral1
Sample
37fa8fa315d60727ebce5fafa56690b8.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
37fa8fa315d60727ebce5fafa56690b8.exe
Resource
win10v2004-20220310-en
General
-
Target
37fa8fa315d60727ebce5fafa56690b8.exe
-
Size
240KB
-
MD5
37fa8fa315d60727ebce5fafa56690b8
-
SHA1
599c28e16fda50ab1377e900678084ae28557090
-
SHA256
e398c99bd0f61a4590594dc912e4d4ad23c306df6bd00274e2756d1a28f3ef80
-
SHA512
cc900fb64eececdd030be5d6b79ef4213f128cae0f4314e77ced24df573d54a68350c2bcd3c5f448e4c640d336ef4888bc2b9a5a6fca1ba39668df4b43c50b09
Malware Config
Signatures
-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Executes dropped EXE 1 IoCs
pid Process 1220 drpbx.exe -
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\DisableWait.tif.fun drpbx.exe File created C:\Users\Admin\Pictures\ShowSwitch.raw.fun drpbx.exe File created C:\Users\Admin\Pictures\UseMove.raw.fun drpbx.exe File created C:\Users\Admin\Pictures\BackupExport.tif.fun drpbx.exe File created C:\Users\Admin\Pictures\ConvertToReceive.png.fun drpbx.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3422572840-2899912402-917774768-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Frfx\\firefox.exe" 37fa8fa315d60727ebce5fafa56690b8.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\CloseInitialize.mpeg.fun drpbx.exe File created C:\Program Files\7-Zip\Lang\ko.txt.fun drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\th.txt.fun drpbx.exe File created C:\Program Files\7-Zip\Lang\uk.txt.fun drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.Interop.InfoPath.SemiTrust.xml drpbx.exe File created C:\Program Files\7-Zip\Lang\io.txt.fun drpbx.exe File created C:\Program Files\7-Zip\Lang\mng2.txt.fun drpbx.exe File created C:\Program Files\7-Zip\Lang\nn.txt.fun drpbx.exe File created C:\Program Files\7-Zip\Lang\sr-spc.txt.fun drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\ast.txt.fun drpbx.exe File created C:\Program Files\7-Zip\Lang\ms.txt.fun drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\pt-br.txt.fun drpbx.exe File created C:\Program Files\7-Zip\Lang\tt.txt.fun drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\ConnectionManager.xml drpbx.exe File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextServiceSimplifiedZhengMa.txt drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\AssemblyList_4_client.xml drpbx.exe File created C:\Program Files\7-Zip\Lang\an.txt.fun drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\pt.txt.fun drpbx.exe File opened for modification C:\Program Files\Common Files\Services\verisign.bmp drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt drpbx.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\TableTextServiceArray.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\af.txt.fun drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\lt.txt.fun drpbx.exe File created C:\Program Files\VideoLAN\VLC\COPYING.txt.fun drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\uz.txt.fun drpbx.exe File created C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt.fun drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.BusinessApplications.RuntimeUi.xml drpbx.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Media Renderer\connectionmanager_dmr.xml drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.BusinessData.xml drpbx.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.VisualElementsManifest.xml drpbx.exe File created C:\Program Files\7-Zip\Lang\cy.txt.fun drpbx.exe File created C:\Program Files\7-Zip\Lang\eo.txt.fun drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\vi.txt.fun drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_bw32.jpg drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt drpbx.exe File opened for modification C:\Program Files\Java\jre7\README.txt drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Media Renderer\DMR_120.jpg drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Media Renderer\DMR_48.png drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_bw120.jpg drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color32.jpg drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color120.jpg drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color48.jpg drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\hr.txt.fun drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Media Renderer\DMR_48.jpg drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\mk.txt.fun drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt drpbx.exe File created C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt.fun drpbx.exe File created C:\Program Files\7-Zip\Lang\zh-cn.txt.fun drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color120.png drpbx.exe File created C:\Program Files\FormatConnect.mp3.fun drpbx.exe File created C:\Program Files\7-Zip\Lang\ar.txt.fun drpbx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 812 wrote to memory of 1220 812 37fa8fa315d60727ebce5fafa56690b8.exe 28 PID 812 wrote to memory of 1220 812 37fa8fa315d60727ebce5fafa56690b8.exe 28 PID 812 wrote to memory of 1220 812 37fa8fa315d60727ebce5fafa56690b8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\37fa8fa315d60727ebce5fafa56690b8.exe"C:\Users\Admin\AppData\Local\Temp\37fa8fa315d60727ebce5fafa56690b8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe"C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\AppData\Local\Temp\37fa8fa315d60727ebce5fafa56690b8.exe2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops file in Program Files directory
PID:1220
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD537fa8fa315d60727ebce5fafa56690b8
SHA1599c28e16fda50ab1377e900678084ae28557090
SHA256e398c99bd0f61a4590594dc912e4d4ad23c306df6bd00274e2756d1a28f3ef80
SHA512cc900fb64eececdd030be5d6b79ef4213f128cae0f4314e77ced24df573d54a68350c2bcd3c5f448e4c640d336ef4888bc2b9a5a6fca1ba39668df4b43c50b09
-
Filesize
240KB
MD537fa8fa315d60727ebce5fafa56690b8
SHA1599c28e16fda50ab1377e900678084ae28557090
SHA256e398c99bd0f61a4590594dc912e4d4ad23c306df6bd00274e2756d1a28f3ef80
SHA512cc900fb64eececdd030be5d6b79ef4213f128cae0f4314e77ced24df573d54a68350c2bcd3c5f448e4c640d336ef4888bc2b9a5a6fca1ba39668df4b43c50b09