Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-01-2024 05:44
Behavioral task
behavioral1
Sample
95b7cfcdbe25fce19e887510d5da55ffdff66b3ef6db7400977f9bb94f9fec2c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
95b7cfcdbe25fce19e887510d5da55ffdff66b3ef6db7400977f9bb94f9fec2c.exe
Resource
win10v2004-20231215-en
General
-
Target
95b7cfcdbe25fce19e887510d5da55ffdff66b3ef6db7400977f9bb94f9fec2c.exe
-
Size
5.3MB
-
MD5
79b6d4f066d1875b18de19ad54177fa7
-
SHA1
d99188afd625268875b1050bd561a72c51d51d38
-
SHA256
95b7cfcdbe25fce19e887510d5da55ffdff66b3ef6db7400977f9bb94f9fec2c
-
SHA512
365ac763dfd0986ad06acfc6b5d6a1c124ec8816d5a5ddc05f4145a91bb6fd50b7e97b4fa3d309adfe4995f57375583c619d919ecdcc1b3c792cdef9e6414cd6
-
SSDEEP
49152:CGUKMViI+OozP3w5C49ckglrOugdutUeUCyLQrO/LH:IK0iI+HPA
Malware Config
Signatures
-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Renames multiple (2092) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
UPX dump on OEP (original entry point) 7 IoCs
resource yara_rule behavioral1/memory/2564-0-0x0000000000400000-0x0000000000454000-memory.dmp UPX behavioral1/files/0x0007000000014a4a-166.dat UPX behavioral1/memory/372-171-0x0000000000400000-0x0000000000454000-memory.dmp UPX behavioral1/files/0x0007000000014a4a-169.dat UPX behavioral1/memory/2564-178-0x0000000000400000-0x0000000000454000-memory.dmp UPX behavioral1/files/0x0007000000014a4a-168.dat UPX behavioral1/memory/372-582-0x0000000000400000-0x0000000000454000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 372 drpbx.exe -
Loads dropped DLL 1 IoCs
pid Process 2564 95b7cfcdbe25fce19e887510d5da55ffdff66b3ef6db7400977f9bb94f9fec2c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2564-0-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/files/0x0007000000014a4a-166.dat upx behavioral1/memory/372-171-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/files/0x0007000000014a4a-169.dat upx behavioral1/memory/2564-178-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral1/files/0x0007000000014a4a-168.dat upx behavioral1/memory/372-582-0x0000000000400000-0x0000000000454000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Frfx\\firefox.exe" 95b7cfcdbe25fce19e887510d5da55ffdff66b3ef6db7400977f9bb94f9fec2c.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\modern_m.png drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-host.jar.zemblax drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTaskIcon.jpg drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-autoupdate-cli.xml.zemblax drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-host-remote_zh_CN.jar drpbx.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\ui-bg_highlight-soft_75_ffe45c_1x100.png drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\icon.png drpbx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\content-background.png drpbx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\passportcover.png drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-print.jar drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsVersion1Warning.htm drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsBrowserUpgrade.html drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core.xml.zemblax drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-options_ja.jar.zemblax drpbx.exe File opened for modification C:\Program Files\7-Zip\readme.txt drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\jconsole.jar drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Aspect.xml.zemblax drpbx.exe File created C:\Program Files\Java\jre7\lib\ext\dnsns.jar.zemblax drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_gray_thunderstorm.png drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.nl_zh_4.4.0.v20140623020002.jar drpbx.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\PrivateBrowsing_150.png drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Paper.xml drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Fonts\Essential.xml drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waxing-crescent_partly-cloudy.png drpbx.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\winamp2.xml drpbx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\1047x576black.png drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\calendar_double_bkg.png drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench_1.2.1.v20140901-1244.jar drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-editor-mimelookup-impl_ja.jar drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ql_2.0.100.v20131211-1531.jar drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\feature.xml.zemblax drpbx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsptb.xml drpbx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\SportsMainToScenesBackground.wmv drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\resources.jar drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\bg_Country.gif.zemblax drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\clock.html drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.jsp.jasper_1.0.400.v20130327-1442.jar.zemblax drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color48.jpg drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\service.js drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsImageTemplate.html drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_increaseindent.gif drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-awt_zh_CN.jar drpbx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_gray_thunderstorm.png drpbx.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\VisualElements\SmallLogoDev.png.zemblax drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.ja_5.5.0.165303.jar drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-api-progress.jar drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsViewAttachmentIcons.jpg drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-swing-outline.xml.zemblax drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ExecutiveMergeLetter.dotx drpbx.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\pdf.gif drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\localizedStrings.js drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-selector-api.xml drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-output2_ja.jar drpbx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsen.xml drpbx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\diner_s.png drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui_5.5.0.165303.jar drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\CommsIncomingImageSmall.jpg drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\alert_obj.png.zemblax drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-javahelp_zh_CN.jar drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\plugin.jar.zemblax drpbx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\default_thumb.jpg drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\graph_over.png drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\feature.xml.zemblax drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-core-windows.jar drpbx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2564 95b7cfcdbe25fce19e887510d5da55ffdff66b3ef6db7400977f9bb94f9fec2c.exe Token: SeDebugPrivilege 372 drpbx.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2564 wrote to memory of 372 2564 95b7cfcdbe25fce19e887510d5da55ffdff66b3ef6db7400977f9bb94f9fec2c.exe 28 PID 2564 wrote to memory of 372 2564 95b7cfcdbe25fce19e887510d5da55ffdff66b3ef6db7400977f9bb94f9fec2c.exe 28 PID 2564 wrote to memory of 372 2564 95b7cfcdbe25fce19e887510d5da55ffdff66b3ef6db7400977f9bb94f9fec2c.exe 28 PID 2564 wrote to memory of 372 2564 95b7cfcdbe25fce19e887510d5da55ffdff66b3ef6db7400977f9bb94f9fec2c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\95b7cfcdbe25fce19e887510d5da55ffdff66b3ef6db7400977f9bb94f9fec2c.exe"C:\Users\Admin\AppData\Local\Temp\95b7cfcdbe25fce19e887510d5da55ffdff66b3ef6db7400977f9bb94f9fec2c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe"C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\AppData\Local\Temp\95b7cfcdbe25fce19e887510d5da55ffdff66b3ef6db7400977f9bb94f9fec2c.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD5000e8c41d4a15fb34d0be0dbb56e3778
SHA100c4eae64ee6239d7c65d819c6ce1ac329224f8c
SHA2568bdfa6a5b7de345cf0d4fe0e9c17d8b0e9db26d58b05b1b2ebbb3a05a068ff28
SHA512775d832eb8ab73e4a93789917dca69edb6c91fbb426e02acf7c6e213ffb4575776187209d1c471fbf57c4621ea3c23d9850f6dfc2770d62c17de9d66710800af
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\epl-v10.html.zemblax
Filesize12KB
MD5bd42ba47ff97fd7e395c90f79e0f9508
SHA1c2d8069ff6d72f3c63eeeac23933e5620f649d9d
SHA2563ad6f0a5c15cd3e24aa59e9687649e0d8d8b85789f3feef68e22b61a34a183e5
SHA5124eb6b58c46225f6e96bf41177892131384507cd8437e314426b797797c10960db52b84abd1fbf3cd845d1ed4bb8c67d2be3099a9ff5379a04d059b0557ef7fca
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\license.html.zemblax
Filesize8KB
MD529c6678d44aa7966ae163d70dd9f3661
SHA104e2608b9497905befec2c9c74931cdd14c754e8
SHA256f7634f4769d57b1fd7ff257cafd60a0b309194e610202dfd26fc5113d0abf834
SHA512e80a6a0270d20e255f84ee6ef285b610b79731058f88272b8246e4f0c97222cebf2113d7ae70a1a145c0bec2a94fea5cb5abff0203a8be64c634a9b9b6a3b1b6
-
Filesize
134KB
MD50dcea20697ee8d55a543627b06ceb3cd
SHA133268528a73c4095bff810d012b2ab9384c01b33
SHA256751e481669b52edabe1f44a7d6bbf4cdcb12fa13e08e0c1f00325ebbd5e76ead
SHA512ae6e2726a311ff3851340a9f52839f963923990d1ea34644ce921114624ac560e957012f36aa912817d8cf595224550277f036ca9828b39093d4b1ef2e608131
-
Filesize
133KB
MD5aebab744da08df109a49a5a849d575f3
SHA1a39f583bab052b357463de57570f905cc35f99e3
SHA256bd4846da0808c0ae4c642cea3477b0404a0689a9dd44017caaaf803c17c5a4c8
SHA512330680938f6bf394e5cc10a317c45959b37c3d26996378681db857c517587040bdbc45447bbfedd694f46a2a5f8e20e6bd88931b209499b843b8ca6d7e7cf449
-
Filesize
16B
MD5cfdae8214d34112dbee6587664059558
SHA1f649f45d08c46572a9a50476478ddaef7e964353
SHA25633088cb514406f31e3d96a92c03294121ee9f24e176f7062625c2b36bee7a325
SHA512c260f2c223ecbf233051ac1d6a1548ad188a2777085e9d43b02da41b291ff258e4c506f99636150847aa24918c7bbb703652fef2fe55b3f50f85b5bd8dd5f6e3
-
Filesize
12KB
MD5d24ec82a4d319cd22ea140e307996a90
SHA1b84a2c99c98cf45e7e104dcc2bff1330c2f660f0
SHA256b10c8ae59fe50e09bd51f7da9750fbadadf6960694558f1bdd902c5912a1866c
SHA5121920922f1adea644e62e604254d4570750287e3bdd4af0f895a1d81a7d6a7c08275dc06f2e7644eb2bebb075b7f5f8cd5381455c4298758009d8fe1ae130da21