Resubmissions

09-10-2023 22:49

231009-2rx68aba24 10

05-11-2020 14:34

201105-wwra1hx6zn 10

Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2023 22:49

General

  • Target

    b3af58566437f83301cd884feaaa2c4b6c827498969a2abbe48afc03351facb3.exe

  • Size

    41KB

  • MD5

    0efb06144ff6e9eb6bdc03fafa5167a7

  • SHA1

    894bc02320d1308462ce004cf06e1bb1841d22c2

  • SHA256

    b3af58566437f83301cd884feaaa2c4b6c827498969a2abbe48afc03351facb3

  • SHA512

    a4e4f538ad17d32c63f5b6b5be26115931480544ca921bec09bbe0dcb0989455fb29a8ddd97c3e14b4b1250b9aa8b19aa0e0849fcf1dd57f2d3f934f7e973a96

  • SSDEEP

    768:P/qD8gHkDXmFY26O92PdAIAabphLyUvQX9EmY17cefj:PYtNFY2noyvGp8HmN

Malware Config

Signatures

  • Jigsaw Ransomware

    Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b3af58566437f83301cd884feaaa2c4b6c827498969a2abbe48afc03351facb3.exe
    "C:\Users\Admin\AppData\Local\Temp\b3af58566437f83301cd884feaaa2c4b6c827498969a2abbe48afc03351facb3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Users\Admin\AppData\Local\Adobe (x86)\AcroRd32.exe
      "C:\Users\Admin\AppData\Local\Adobe (x86)\AcroRd32.exe" C:\Users\Admin\AppData\Local\Temp\b3af58566437f83301cd884feaaa2c4b6c827498969a2abbe48afc03351facb3.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:1308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\invalid32x32.gif.v315

    Filesize

    160B

    MD5

    0886385c883e6319ec019dbdb8315eb6

    SHA1

    0014ca1ac628640303bd85fe5d0909f7e27e89fd

    SHA256

    f26915835c298fd96670ec6995b4f47c83339199ebdad9dad29af80158743c0f

    SHA512

    ec694d0a039a599a245730dc68bde906771eed376bc3d2065a9250c3754ead96a483f8722bc11f4d4001890a6ae791291f1b0e43236b9a1655797c4dabaea830

  • C:\Users\Admin\AppData\Local\Adobe (x86)\AcroRd32.exe

    Filesize

    41KB

    MD5

    0efb06144ff6e9eb6bdc03fafa5167a7

    SHA1

    894bc02320d1308462ce004cf06e1bb1841d22c2

    SHA256

    b3af58566437f83301cd884feaaa2c4b6c827498969a2abbe48afc03351facb3

    SHA512

    a4e4f538ad17d32c63f5b6b5be26115931480544ca921bec09bbe0dcb0989455fb29a8ddd97c3e14b4b1250b9aa8b19aa0e0849fcf1dd57f2d3f934f7e973a96

  • C:\Users\Admin\AppData\Local\Adobe (x86)\AcroRd32.exe

    Filesize

    41KB

    MD5

    0efb06144ff6e9eb6bdc03fafa5167a7

    SHA1

    894bc02320d1308462ce004cf06e1bb1841d22c2

    SHA256

    b3af58566437f83301cd884feaaa2c4b6c827498969a2abbe48afc03351facb3

    SHA512

    a4e4f538ad17d32c63f5b6b5be26115931480544ca921bec09bbe0dcb0989455fb29a8ddd97c3e14b4b1250b9aa8b19aa0e0849fcf1dd57f2d3f934f7e973a96

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\container.dat.v315

    Filesize

    16B

    MD5

    b5b7270686c0ed7cc8b209f45a00e057

    SHA1

    ef125d69d70409dae0f5079eb4ca7de2e02ac748

    SHA256

    ab1deb20552b9a7708bdfdc03c9b3248e7b97550dfd1044f7cf2e78b5a313f38

    SHA512

    c3d1acf3653dc891ce5b373cb7080651029dd5f32341c38c674c2ccc6aff0ccc6cc2f5367ee329124338400e13f1c06388c8c428aa09da2d4b9a8c099d3fa1bf

  • memory/1308-10-0x000007FEF50D0000-0x000007FEF5A6D000-memory.dmp

    Filesize

    9.6MB

  • memory/1308-9-0x000007FEF50D0000-0x000007FEF5A6D000-memory.dmp

    Filesize

    9.6MB

  • memory/1308-34-0x00000000008F0000-0x0000000000970000-memory.dmp

    Filesize

    512KB

  • memory/1308-35-0x000007FEF50D0000-0x000007FEF5A6D000-memory.dmp

    Filesize

    9.6MB

  • memory/1308-36-0x000007FEF50D0000-0x000007FEF5A6D000-memory.dmp

    Filesize

    9.6MB

  • memory/1308-2002-0x00000000008F0000-0x0000000000970000-memory.dmp

    Filesize

    512KB

  • memory/1308-2005-0x00000000008F0000-0x0000000000970000-memory.dmp

    Filesize

    512KB

  • memory/2436-2-0x000007FEF50D0000-0x000007FEF5A6D000-memory.dmp

    Filesize

    9.6MB

  • memory/2436-11-0x000007FEF50D0000-0x000007FEF5A6D000-memory.dmp

    Filesize

    9.6MB

  • memory/2436-8-0x000007FEF50D0000-0x000007FEF5A6D000-memory.dmp

    Filesize

    9.6MB

  • memory/2436-3-0x0000000001DB0000-0x0000000001E30000-memory.dmp

    Filesize

    512KB