General

  • Target

    0921add95609d77f0c6195b2bec474b693ec217abb1db496f367c768bfbe7cca

  • Size

    1.1MB

  • Sample

    220714-jn1ttsdbgp

  • MD5

    a362de111d5dff6bcdeaf4717af268b6

  • SHA1

    2e5104db35871c5bc7da2035d8b91398bb5d5e0e

  • SHA256

    0921add95609d77f0c6195b2bec474b693ec217abb1db496f367c768bfbe7cca

  • SHA512

    b48a18158a0dff9a9012952c467fcf69b8bfc53ceeacaf32a90fc4b7f3afd34465e676b282fa87f3c5c85b4780baf96cc754dcdeef77ba5330fa8c4fd1d20b72

Malware Config

Targets

    • Target

      0921add95609d77f0c6195b2bec474b693ec217abb1db496f367c768bfbe7cca

    • Size

      1.1MB

    • MD5

      a362de111d5dff6bcdeaf4717af268b6

    • SHA1

      2e5104db35871c5bc7da2035d8b91398bb5d5e0e

    • SHA256

      0921add95609d77f0c6195b2bec474b693ec217abb1db496f367c768bfbe7cca

    • SHA512

      b48a18158a0dff9a9012952c467fcf69b8bfc53ceeacaf32a90fc4b7f3afd34465e676b282fa87f3c5c85b4780baf96cc754dcdeef77ba5330fa8c4fd1d20b72

    • Jigsaw Ransomware

      Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

2
T1120

Tasks