Resubmissions

09-10-2023 22:49

231009-2rxwfsgh8z 10

06-03-2021 22:20

210306-e542m4kcwn 10

09-11-2020 19:51

201109-ldpapz7ekx 10

Analysis

  • max time kernel
    144s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    09-10-2023 22:49

General

  • Target

    SecuriteInfo.com.BehavesLike.Win32.Generic.dc.exe

  • Size

    291KB

  • MD5

    5a5c745bf3e97fe2be01880132662f28

  • SHA1

    924af25d379fc88319bc55958db898dbf5054309

  • SHA256

    0ec947a4f30a6ad7d055c72f5d6c1ffe7a538349f41e8156e9aa5c7a8b0d7811

  • SHA512

    151e4a07e19350d677e049c57c971b64924150eec007e665843cb6142ec73fc06ae4145c64164d3f7f25a376a7536ac6d9b3c85180503549a0c86f09cc0ded10

  • SSDEEP

    6144:mdSK04ETTZ+4TBpvjLC4Ho/C1rCyPucrFqBFTbL39rqHRs8:moL4EnU4T/vjLTHtrCWurTpruF

Malware Config

Signatures

  • Jigsaw Ransomware

    Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.dc.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.dc.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe
      "C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Generic.dc.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\invalid32x32.gif.zemblax

    Filesize

    160B

    MD5

    03186ca0229630a6928fa98ef4c3391b

    SHA1

    8deed189ee4ae64db770d5755f9c199c8213eaa9

    SHA256

    f171defc92b8fda921aae4bd1696d3252effc17dff52b567e19559ab29f287bc

    SHA512

    5a712127004b6506fbe562f2eb402e8a40844cb4a6edeb010c833bf552be784cf4ce560cd0235367823d7f77c38e80b83e2f3cafb6e1d613944a9b38c8f886ab

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\epl-v10.html.zemblax

    Filesize

    12KB

    MD5

    3e91afea42e65b6ef2434693f1307f99

    SHA1

    2e529680a82d0847d10a8e6290c92b161d57f98e

    SHA256

    65cfafbad3fb6c3eb46b39eb7e1ec5437d1a2c85f9b063db04efa6f05ec3a822

    SHA512

    059405e8602f8fdc572f4dc00b9757d913b1a6de5989d33dcea1116534cad6c85e581e25337f23a87bcb6b81281d74a3e1a29dbf8bde9dd1174a6a63d3524607

  • C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\license.html.zemblax

    Filesize

    8KB

    MD5

    cf75643ba7d46ff26bdf871bddd23f9f

    SHA1

    0d21764fbe1ecbfd73ba7d150ff7be9a9fd9a9e3

    SHA256

    37ce802664c0715ea1b528b0bd16fe0e3bcbc008e115a1e257be102ad255bbc7

    SHA512

    8b44dbf2028e0b3d51addf87eeeba15abf57660aaeb5259b4a97adb06b83c4a41012f84cc28b3f4072228016c75fd1b31e4e5964f869c13e2bf5ab6ad3ec3f7a

  • C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe

    Filesize

    291KB

    MD5

    5a5c745bf3e97fe2be01880132662f28

    SHA1

    924af25d379fc88319bc55958db898dbf5054309

    SHA256

    0ec947a4f30a6ad7d055c72f5d6c1ffe7a538349f41e8156e9aa5c7a8b0d7811

    SHA512

    151e4a07e19350d677e049c57c971b64924150eec007e665843cb6142ec73fc06ae4145c64164d3f7f25a376a7536ac6d9b3c85180503549a0c86f09cc0ded10

  • C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe

    Filesize

    291KB

    MD5

    5a5c745bf3e97fe2be01880132662f28

    SHA1

    924af25d379fc88319bc55958db898dbf5054309

    SHA256

    0ec947a4f30a6ad7d055c72f5d6c1ffe7a538349f41e8156e9aa5c7a8b0d7811

    SHA512

    151e4a07e19350d677e049c57c971b64924150eec007e665843cb6142ec73fc06ae4145c64164d3f7f25a376a7536ac6d9b3c85180503549a0c86f09cc0ded10

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\container.dat.zemblax

    Filesize

    16B

    MD5

    826ba14567ed55f5b8379572f2f4c18f

    SHA1

    058d2dd1512aff32324c5c82f56ee6bb3db11fdb

    SHA256

    485e5116cf106b073e5a4277b6f73ebbc97546aef23bccae4ddd5cfd7ca9ca16

    SHA512

    9256d414e06142134d260206fd763fdcd0002e66a2ece26ed295a1c5f761659b545bb7c81fefa1d0a72478e3dd71343dd653e65bdf66954c4991e3ee0bb57911

  • \Users\Admin\AppData\Local\Drpbx\drpbx.exe

    Filesize

    291KB

    MD5

    5a5c745bf3e97fe2be01880132662f28

    SHA1

    924af25d379fc88319bc55958db898dbf5054309

    SHA256

    0ec947a4f30a6ad7d055c72f5d6c1ffe7a538349f41e8156e9aa5c7a8b0d7811

    SHA512

    151e4a07e19350d677e049c57c971b64924150eec007e665843cb6142ec73fc06ae4145c64164d3f7f25a376a7536ac6d9b3c85180503549a0c86f09cc0ded10

  • memory/2212-54-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-66-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-4-0x0000000001D70000-0x0000000001DB0000-memory.dmp

    Filesize

    256KB

  • memory/2212-5-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-6-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-8-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-10-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-12-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-14-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-16-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-18-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-20-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-22-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-24-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-26-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-30-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-32-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-36-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-38-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-42-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-46-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-48-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-52-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-2-0x0000000001D70000-0x0000000001DB0000-memory.dmp

    Filesize

    256KB

  • memory/2212-58-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-60-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-64-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-3-0x0000000001D70000-0x0000000001DB0000-memory.dmp

    Filesize

    256KB

  • memory/2212-68-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-62-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-56-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-50-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-44-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-40-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-34-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-28-0x0000000004520000-0x0000000004553000-memory.dmp

    Filesize

    204KB

  • memory/2212-163-0x0000000004710000-0x0000000004711000-memory.dmp

    Filesize

    4KB

  • memory/2212-171-0x0000000074A30000-0x0000000074FDB000-memory.dmp

    Filesize

    5.7MB

  • memory/2212-0-0x0000000074A30000-0x0000000074FDB000-memory.dmp

    Filesize

    5.7MB

  • memory/2212-1-0x0000000074A30000-0x0000000074FDB000-memory.dmp

    Filesize

    5.7MB

  • memory/2816-172-0x0000000074A30000-0x0000000074FDB000-memory.dmp

    Filesize

    5.7MB

  • memory/2816-180-0x0000000074A30000-0x0000000074FDB000-memory.dmp

    Filesize

    5.7MB

  • memory/2816-334-0x0000000002030000-0x0000000002031000-memory.dmp

    Filesize

    4KB

  • memory/2816-335-0x0000000074A30000-0x0000000074FDB000-memory.dmp

    Filesize

    5.7MB

  • memory/2816-336-0x0000000002040000-0x0000000002080000-memory.dmp

    Filesize

    256KB

  • memory/2816-174-0x0000000002040000-0x0000000002080000-memory.dmp

    Filesize

    256KB

  • memory/2816-176-0x0000000002040000-0x0000000002080000-memory.dmp

    Filesize

    256KB

  • memory/2816-337-0x0000000002040000-0x0000000002080000-memory.dmp

    Filesize

    256KB

  • memory/2816-338-0x0000000002040000-0x0000000002080000-memory.dmp

    Filesize

    256KB

  • memory/2816-2424-0x0000000002040000-0x0000000002080000-memory.dmp

    Filesize

    256KB

  • memory/2816-2425-0x0000000005DC0000-0x0000000005EC0000-memory.dmp

    Filesize

    1024KB

  • memory/2816-2428-0x0000000002040000-0x0000000002080000-memory.dmp

    Filesize

    256KB

  • memory/2816-2429-0x0000000005DC0000-0x0000000005EC0000-memory.dmp

    Filesize

    1024KB