General
-
Target
NEAS.tmp_JC.exe
-
Size
5.3MB
-
Sample
231008-vl1a3aee91
-
MD5
79b6d4f066d1875b18de19ad54177fa7
-
SHA1
d99188afd625268875b1050bd561a72c51d51d38
-
SHA256
95b7cfcdbe25fce19e887510d5da55ffdff66b3ef6db7400977f9bb94f9fec2c
-
SHA512
365ac763dfd0986ad06acfc6b5d6a1c124ec8816d5a5ddc05f4145a91bb6fd50b7e97b4fa3d309adfe4995f57375583c619d919ecdcc1b3c792cdef9e6414cd6
-
SSDEEP
49152:CGUKMViI+OozP3w5C49ckglrOugdutUeUCyLQrO/LH:IK0iI+HPA
Behavioral task
behavioral1
Sample
NEAS.tmp_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.tmp_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
NEAS.tmp_JC.exe
-
Size
5.3MB
-
MD5
79b6d4f066d1875b18de19ad54177fa7
-
SHA1
d99188afd625268875b1050bd561a72c51d51d38
-
SHA256
95b7cfcdbe25fce19e887510d5da55ffdff66b3ef6db7400977f9bb94f9fec2c
-
SHA512
365ac763dfd0986ad06acfc6b5d6a1c124ec8816d5a5ddc05f4145a91bb6fd50b7e97b4fa3d309adfe4995f57375583c619d919ecdcc1b3c792cdef9e6414cd6
-
SSDEEP
49152:CGUKMViI+OozP3w5C49ckglrOugdutUeUCyLQrO/LH:IK0iI+HPA
Score10/10-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-