Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/01/2024, 05:43 UTC

General

  • Target

    802fef4d4f81c443497362711a7d8611741c30373c96d3229d699f225552a5f5.exe

  • Size

    78KB

  • MD5

    c5eff77db7eb62c4066247adfcd64797

  • SHA1

    acf5f645a1af2987c8a5398c12d03622feba9d35

  • SHA256

    802fef4d4f81c443497362711a7d8611741c30373c96d3229d699f225552a5f5

  • SHA512

    1610710c081064743dcfc9b7f5cdf42e63c9f78f3f55983c7f00ae6e60124489a5239cafb89375cc8e3d9d7696eeed7bb23f05dcda52644aafee651f69768dbd

  • SSDEEP

    1536:m3l0Bj+w0lplDHFNGlNEQZwS+g+vkjf9Hy+D00m:m3lkCwQplDleNGS+g+kjfEb

Malware Config

Signatures

  • Jigsaw Ransomware

    Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.

  • Renames multiple (2014) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\802fef4d4f81c443497362711a7d8611741c30373c96d3229d699f225552a5f5.exe
    "C:\Users\Admin\AppData\Local\Temp\802fef4d4f81c443497362711a7d8611741c30373c96d3229d699f225552a5f5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe
      "C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\AppData\Local\Temp\802fef4d4f81c443497362711a7d8611741c30373c96d3229d699f225552a5f5.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\invalid32x32.gif.fun

    Filesize

    160B

    MD5

    000e8c41d4a15fb34d0be0dbb56e3778

    SHA1

    00c4eae64ee6239d7c65d819c6ce1ac329224f8c

    SHA256

    8bdfa6a5b7de345cf0d4fe0e9c17d8b0e9db26d58b05b1b2ebbb3a05a068ff28

    SHA512

    775d832eb8ab73e4a93789917dca69edb6c91fbb426e02acf7c6e213ffb4575776187209d1c471fbf57c4621ea3c23d9850f6dfc2770d62c17de9d66710800af

  • C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe

    Filesize

    78KB

    MD5

    c5eff77db7eb62c4066247adfcd64797

    SHA1

    acf5f645a1af2987c8a5398c12d03622feba9d35

    SHA256

    802fef4d4f81c443497362711a7d8611741c30373c96d3229d699f225552a5f5

    SHA512

    1610710c081064743dcfc9b7f5cdf42e63c9f78f3f55983c7f00ae6e60124489a5239cafb89375cc8e3d9d7696eeed7bb23f05dcda52644aafee651f69768dbd

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\container.dat.fun

    Filesize

    16B

    MD5

    cfdae8214d34112dbee6587664059558

    SHA1

    f649f45d08c46572a9a50476478ddaef7e964353

    SHA256

    33088cb514406f31e3d96a92c03294121ee9f24e176f7062625c2b36bee7a325

    SHA512

    c260f2c223ecbf233051ac1d6a1548ad188a2777085e9d43b02da41b291ff258e4c506f99636150847aa24918c7bbb703652fef2fe55b3f50f85b5bd8dd5f6e3

  • memory/2080-2-0x000007FEF5BC0000-0x000007FEF655D000-memory.dmp

    Filesize

    9.6MB

  • memory/2080-8-0x000007FEF5BC0000-0x000007FEF655D000-memory.dmp

    Filesize

    9.6MB

  • memory/2080-9-0x000007FEF5BC0000-0x000007FEF655D000-memory.dmp

    Filesize

    9.6MB

  • memory/2080-3-0x0000000002030000-0x00000000020B0000-memory.dmp

    Filesize

    512KB

  • memory/2664-11-0x000007FEF5BC0000-0x000007FEF655D000-memory.dmp

    Filesize

    9.6MB

  • memory/2664-244-0x0000000001F20000-0x0000000001FA0000-memory.dmp

    Filesize

    512KB

  • memory/2664-245-0x000007FEF5BC0000-0x000007FEF655D000-memory.dmp

    Filesize

    9.6MB

  • memory/2664-243-0x000007FEF5BC0000-0x000007FEF655D000-memory.dmp

    Filesize

    9.6MB

  • memory/2664-10-0x0000000001F20000-0x0000000001FA0000-memory.dmp

    Filesize

    512KB

  • memory/2664-2036-0x0000000001F20000-0x0000000001FA0000-memory.dmp

    Filesize

    512KB

  • memory/2664-2039-0x0000000001F20000-0x0000000001FA0000-memory.dmp

    Filesize

    512KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.