Analysis

  • max time kernel
    120s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    17-04-2023 20:37

General

  • Target

    jigsaw.exe

  • Size

    283KB

  • MD5

    2773e3dc59472296cb0024ba7715a64e

  • SHA1

    27d99fbca067f478bb91cdbcb92f13a828b00859

  • SHA256

    3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7

  • SHA512

    6ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262

  • SSDEEP

    6144:7fukPLPvucHiQQQ4uuy9ApZbZWxcZt+kTfMLJTOAZiYSXjjeqXus:7fu5cCT7yYlWi8kTfMLJTOAZiYSXjyqX

Malware Config

Signatures

  • Jigsaw Ransomware

    Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.

  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\jigsaw.exe
    "C:\Users\Admin\AppData\Local\Temp\jigsaw.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:892
    • C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe
      "C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\AppData\Local\Temp\jigsaw.exe
      2⤵
      • Modifies extensions of user files
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:1736
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1328
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x454
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1172
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Documents\These.docx"
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1212
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        2⤵
          PID:1288

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\invalid32x32.gif.fun

        Filesize

        160B

        MD5

        580ee0344b7da2786da6a433a1e84893

        SHA1

        60f8c4dd5457e9834f5402cb326b1a2d3ca0ba7e

        SHA256

        98b6c2ddfefc628d03ceaef9d69688674a6bc32eb707f9ed86bc8c75675c4513

        SHA512

        356d2cdea3321e894b5b46ad1ea24c0e3c8be8e3c454b5bd300b7340cbb454e71fc89ca09ea0785b373b483e67c2f6f6bb408e489b0de4ff82d5ed69a75613ba

      • C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe

        Filesize

        283KB

        MD5

        2773e3dc59472296cb0024ba7715a64e

        SHA1

        27d99fbca067f478bb91cdbcb92f13a828b00859

        SHA256

        3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7

        SHA512

        6ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262

      • C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe

        Filesize

        283KB

        MD5

        2773e3dc59472296cb0024ba7715a64e

        SHA1

        27d99fbca067f478bb91cdbcb92f13a828b00859

        SHA256

        3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7

        SHA512

        6ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262

      • C:\Users\Admin\AppData\Roaming\Microsoft\Document Building Blocks\1033\14\Built-In Building Blocks.dotx

        Filesize

        4.0MB

        MD5

        d572f3c193cbfc88c4f3779657b8e20d

        SHA1

        db07b42317293f2e331c4f34a34fc44abb4c9793

        SHA256

        5e9b4e081abe7439af6fe53489108d8de3d0c9dbc297f080a1cf17e4913fdfd5

        SHA512

        cae95d69f65b13de18908d57186a7fd9c74762152a3e0a51f5031ff029231cffdaf40e69b07c5ecbf812cd8f7c6d2c425abba35ad8fe4567e66a6df949751564

      • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

        Filesize

        76B

        MD5

        a42b06625cbe2295977d6cdb57afafd6

        SHA1

        2fe19b3b57eb4ac19636cb64dd257471a507362c

        SHA256

        f169a6dbb41bb4f6659548deb3cc921344b1baa2c76fc46168ceda906cdaa414

        SHA512

        c4b07bc94d4a8cd1cdf6803c0976f6026b72a62b05721e8ec0abf9c12bfd4d1bd8b61b461b6fab5a3bfb242b1ba4809ced4be1ee9d99ed47911c6448306987bd

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

        Filesize

        20KB

        MD5

        2b4ed3114c6097dc6e453076d75fb0cd

        SHA1

        af449e33415d7d84fba2432dc68ccf74479911ed

        SHA256

        8a887ace49ff60e7993f4d58160bee281c1b9b92cccfd0b8ebc7006d623a4122

        SHA512

        5a33205e9c183a96522a0e00ab0bab0aee4dce98d79526030ad2363d573f10a1c50f3a176da13096bcc496b5760a57ae1914d044eb16dc5723c354b414290bda

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

        Filesize

        20KB

        MD5

        2b4ed3114c6097dc6e453076d75fb0cd

        SHA1

        af449e33415d7d84fba2432dc68ccf74479911ed

        SHA256

        8a887ace49ff60e7993f4d58160bee281c1b9b92cccfd0b8ebc7006d623a4122

        SHA512

        5a33205e9c183a96522a0e00ab0bab0aee4dce98d79526030ad2363d573f10a1c50f3a176da13096bcc496b5760a57ae1914d044eb16dc5723c354b414290bda

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DNTException\container.dat.fun

        Filesize

        16B

        MD5

        8ebcc5ca5ac09a09376801ecdd6f3792

        SHA1

        81187142b138e0245d5d0bc511f7c46c30df3e14

        SHA256

        619e246fc0ac11320ff9e322a979948d949494b0c18217f4d794e1b398818880

        SHA512

        cec50bfc6ad2f57f16da99459f40f2d424c6d5691685fa1053284f46c8c8c8a975d7bcb1f3521c4f3fbdc310cf4714e29404aa23be6021e2e267c97b090dc650

      • C:\Users\Admin\Documents\~$These.docx

        Filesize

        162B

        MD5

        a79c4f5c72edf4d03b604428c3391c2b

        SHA1

        aa9e891973b5d207b845374c4c0f5e8bcef6e7d7

        SHA256

        6cd65f10138a97c6125f202abaf18ab9529bc99172c30bb996d796625ed823ab

        SHA512

        cefbef935f9549d613f03f7c7a77f07f9a6d3cadc6410214de74cebcb2e4716de9838a1f4f6258ea9678351e2e509f3b23976a41ef6eb85a37114b0b65ae7ecf

      • memory/892-54-0x0000000000F20000-0x0000000000F70000-memory.dmp

        Filesize

        320KB

      • memory/892-55-0x0000000000530000-0x0000000000568000-memory.dmp

        Filesize

        224KB

      • memory/1212-333-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/1212-89-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/1736-91-0x0000000000440000-0x00000000004C0000-memory.dmp

        Filesize

        512KB

      • memory/1736-63-0x0000000000440000-0x00000000004C0000-memory.dmp

        Filesize

        512KB

      • memory/1736-62-0x0000000000140000-0x0000000000190000-memory.dmp

        Filesize

        320KB

      • memory/1736-2082-0x0000000000440000-0x00000000004C0000-memory.dmp

        Filesize

        512KB

      • memory/1736-2083-0x0000000000440000-0x00000000004C0000-memory.dmp

        Filesize

        512KB