Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
09/10/2023, 22:48
231009-2rg51aah99 1029/01/2023, 17:35
230129-v55pwsha8v 1030/11/2022, 18:03
221130-wm9rkafc81 10Analysis
-
max time kernel
181s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30/11/2022, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
3efc575b6cfd36e57a7b244a860160a35e76c0945bdad1bd79294a1816887467.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3efc575b6cfd36e57a7b244a860160a35e76c0945bdad1bd79294a1816887467.exe
Resource
win10v2004-20221111-en
General
-
Target
3efc575b6cfd36e57a7b244a860160a35e76c0945bdad1bd79294a1816887467.exe
-
Size
2.4MB
-
MD5
c2c5848ec8ae11e84d42521c527f75ca
-
SHA1
d8d98dff64297d4cf8a227a2c138efc4774942b2
-
SHA256
3efc575b6cfd36e57a7b244a860160a35e76c0945bdad1bd79294a1816887467
-
SHA512
10e3f210c2d98c090ce3a65be2ff70279c07c1bf3dcb06a48dbfaa34ab6471ed0e8f2a35fbf5bd0c9b61b1c55493c5042daa32556b4b28e22c28e8d80c5d0846
-
SSDEEP
49152:3rKiRwG7r2ie/XMK+kLg7SdqnCvIUdJi0l2Css5qq2nY4/gX1aNnUm5vL:3RXK+b7ScCvFPx3Kr48UmN
Malware Config
Signatures
-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Executes dropped EXE 1 IoCs
pid Process 660 drpbx.exe -
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\WaitPublish.raw.locked drpbx.exe File created C:\Users\Admin\Pictures\WatchGet.png.locked drpbx.exe File created C:\Users\Admin\Pictures\WriteRepair.tif.locked drpbx.exe File created C:\Users\Admin\Pictures\CompareGet.raw.locked drpbx.exe File created C:\Users\Admin\Pictures\DisconnectRegister.tif.locked drpbx.exe File created C:\Users\Admin\Pictures\GrantSkip.tif.locked drpbx.exe File created C:\Users\Admin\Pictures\SuspendPublish.raw.locked drpbx.exe File created C:\Users\Admin\Pictures\UnprotectComplete.tif.locked drpbx.exe -
Loads dropped DLL 1 IoCs
pid Process 1772 3efc575b6cfd36e57a7b244a860160a35e76c0945bdad1bd79294a1816887467.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Frfx\\firefox.exe" 3efc575b6cfd36e57a7b244a860160a35e76c0945bdad1bd79294a1816887467.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 1772 3efc575b6cfd36e57a7b244a860160a35e76c0945bdad1bd79294a1816887467.exe 1772 3efc575b6cfd36e57a7b244a860160a35e76c0945bdad1bd79294a1816887467.exe 660 drpbx.exe 660 drpbx.exe 660 drpbx.exe 660 drpbx.exe 660 drpbx.exe 660 drpbx.exe 660 drpbx.exe 660 drpbx.exe 660 drpbx.exe 660 drpbx.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\7-Zip\Lang\uk.txt.locked drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color32.jpg drpbx.exe File created C:\Program Files (x86)\Microsoft.NET\RedistList\AssemblyList_4_extended.xml.locked drpbx.exe File created C:\Program Files\WatchNew.7z.locked drpbx.exe File opened for modification C:\Program Files (x86)\Windows Media Player\WMPDMC.exe drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\sa.txt.locked drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\ar.txt.locked drpbx.exe File opened for modification C:\Program Files\VideoLAN\VLC\NEWS.txt drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color120.jpg drpbx.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe drpbx.exe File created C:\Program Files\7-Zip\Lang\id.txt.locked drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt drpbx.exe File created C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe.locked drpbx.exe File created C:\Program Files\Mozilla Firefox\uninstall\uninstall.log.locked drpbx.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe drpbx.exe File created C:\Program Files\Mozilla Firefox\plugin-container.exe.locked drpbx.exe File created C:\Program Files\7-Zip\Lang\br.txt.locked drpbx.exe File created C:\Program Files\7-Zip\Lang\mr.txt.locked drpbx.exe File created C:\Program Files\7-Zip\Lang\zh-tw.txt.locked drpbx.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.log drpbx.exe File created C:\Program Files\7-Zip\Lang\ast.txt.locked drpbx.exe File created C:\Program Files\7-Zip\Lang\et.txt.locked drpbx.exe File created C:\Program Files\7-Zip\Lang\ko.txt.locked drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Media Renderer\DMR_120.png drpbx.exe File opened for modification C:\Program Files\FindConvert.pot drpbx.exe File created C:\Program Files\MergeSync.mov.locked drpbx.exe File opened for modification C:\Program Files\7-Zip\readme.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\cy.txt.locked drpbx.exe File created C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe.locked drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\mn.txt.locked drpbx.exe File created C:\Program Files\7-Zip\Lang\sr-spl.txt.locked drpbx.exe File created C:\Program Files\ExportAssert.m3u.locked drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\sidebar.exe drpbx.exe File created C:\Program Files\7-Zip\Lang\ro.txt.locked drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Media Renderer\DMR_120.jpg drpbx.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmprph.exe drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt drpbx.exe File created C:\Program Files\VideoLAN\VLC\README.txt.locked drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt drpbx.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Media Renderer\connectionmanager_dmr.xml drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\nn.txt.locked drpbx.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice-install.log drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\tr.txt.locked drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color32.bmp drpbx.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\TableTextServiceArray.txt drpbx.exe File opened for modification C:\Program Files\ExitBackup.ttf drpbx.exe File created C:\Program Files\7-Zip\Lang\pt-br.txt.locked drpbx.exe File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextServiceYi.txt drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.BusinessData.xml drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_bw48.png drpbx.exe File created C:\Program Files\7-Zip\Lang\lt.txt.locked drpbx.exe File created C:\Program Files\7-Zip\Lang\ne.txt.locked drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\THIRDPARTYLICENSEREADME.txt.locked drpbx.exe File opened for modification C:\Program Files\Microsoft Games\Chess\Chess.exe drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt drpbx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1772 3efc575b6cfd36e57a7b244a860160a35e76c0945bdad1bd79294a1816887467.exe 660 drpbx.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1772 wrote to memory of 660 1772 3efc575b6cfd36e57a7b244a860160a35e76c0945bdad1bd79294a1816887467.exe 28 PID 1772 wrote to memory of 660 1772 3efc575b6cfd36e57a7b244a860160a35e76c0945bdad1bd79294a1816887467.exe 28 PID 1772 wrote to memory of 660 1772 3efc575b6cfd36e57a7b244a860160a35e76c0945bdad1bd79294a1816887467.exe 28 PID 1772 wrote to memory of 660 1772 3efc575b6cfd36e57a7b244a860160a35e76c0945bdad1bd79294a1816887467.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3efc575b6cfd36e57a7b244a860160a35e76c0945bdad1bd79294a1816887467.exe"C:\Users\Admin\AppData\Local\Temp\3efc575b6cfd36e57a7b244a860160a35e76c0945bdad1bd79294a1816887467.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe"C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\AppData\Local\Temp\3efc575b6cfd36e57a7b244a860160a35e76c0945bdad1bd79294a1816887467.exe2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:660
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5c2c5848ec8ae11e84d42521c527f75ca
SHA1d8d98dff64297d4cf8a227a2c138efc4774942b2
SHA2563efc575b6cfd36e57a7b244a860160a35e76c0945bdad1bd79294a1816887467
SHA51210e3f210c2d98c090ce3a65be2ff70279c07c1bf3dcb06a48dbfaa34ab6471ed0e8f2a35fbf5bd0c9b61b1c55493c5042daa32556b4b28e22c28e8d80c5d0846
-
Filesize
2.4MB
MD5c2c5848ec8ae11e84d42521c527f75ca
SHA1d8d98dff64297d4cf8a227a2c138efc4774942b2
SHA2563efc575b6cfd36e57a7b244a860160a35e76c0945bdad1bd79294a1816887467
SHA51210e3f210c2d98c090ce3a65be2ff70279c07c1bf3dcb06a48dbfaa34ab6471ed0e8f2a35fbf5bd0c9b61b1c55493c5042daa32556b4b28e22c28e8d80c5d0846
-
Filesize
2.4MB
MD5c2c5848ec8ae11e84d42521c527f75ca
SHA1d8d98dff64297d4cf8a227a2c138efc4774942b2
SHA2563efc575b6cfd36e57a7b244a860160a35e76c0945bdad1bd79294a1816887467
SHA51210e3f210c2d98c090ce3a65be2ff70279c07c1bf3dcb06a48dbfaa34ab6471ed0e8f2a35fbf5bd0c9b61b1c55493c5042daa32556b4b28e22c28e8d80c5d0846