Resubmissions

19-05-2024 13:56

240519-q8s32sah73 10

11-05-2024 08:02

240511-jxchlafd8x 10

Analysis

  • max time kernel
    155s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-05-2024 08:02

General

  • Target

    JigsawRansomware.exe

  • Size

    47KB

  • MD5

    ed3a9817328547480076ef8e1e48bc0b

  • SHA1

    218a7b659078f07892d3e9a9905324b0eb95a5ba

  • SHA256

    0e70bac97f8a8d4eda6347afe83c870b6f87f05f2fe3e7fb0bfcad7b29d0c5e5

  • SHA512

    f0e44829ac76c832bf67bd11193f9d3fb91e13f34110c6dd9f751dc79e2605811a99f149e942509d8dfbb7e461adb6d95735ff6fd378527ea4755fbf98034bf4

  • SSDEEP

    768:BvqfRgrW3UJR/01V+FIpUY21RTjI4I17i6WrggpWxjW6msMev+JN5uMYqDYY:QfKrGUXyYFIpUYIpIRi7xyGsMev+JNwg

Malware Config

Signatures

  • Jigsaw Ransomware

    Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JigsawRansomware.exe
    "C:\Users\Admin\AppData\Local\Temp\JigsawRansomware.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe
      "C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\AppData\Local\Temp\JigsawRansomware.exe
      2⤵
      • Executes dropped EXE
      PID:3020
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3816 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4996

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe

      Filesize

      47KB

      MD5

      ed3a9817328547480076ef8e1e48bc0b

      SHA1

      218a7b659078f07892d3e9a9905324b0eb95a5ba

      SHA256

      0e70bac97f8a8d4eda6347afe83c870b6f87f05f2fe3e7fb0bfcad7b29d0c5e5

      SHA512

      f0e44829ac76c832bf67bd11193f9d3fb91e13f34110c6dd9f751dc79e2605811a99f149e942509d8dfbb7e461adb6d95735ff6fd378527ea4755fbf98034bf4

    • memory/1300-8-0x0000000000CA0000-0x0000000000D3C000-memory.dmp

      Filesize

      624KB

    • memory/1300-7-0x0000000000AF0000-0x0000000000B06000-memory.dmp

      Filesize

      88KB

    • memory/1300-3-0x000000001BA10000-0x000000001BEDE000-memory.dmp

      Filesize

      4.8MB

    • memory/1300-4-0x00007FF9D6085000-0x00007FF9D6086000-memory.dmp

      Filesize

      4KB

    • memory/1300-1-0x00007FF9D5DD0000-0x00007FF9D6771000-memory.dmp

      Filesize

      9.6MB

    • memory/1300-6-0x00007FF9D5DD0000-0x00007FF9D6771000-memory.dmp

      Filesize

      9.6MB

    • memory/1300-2-0x00007FF9D5DD0000-0x00007FF9D6771000-memory.dmp

      Filesize

      9.6MB

    • memory/1300-0-0x00007FF9D6085000-0x00007FF9D6086000-memory.dmp

      Filesize

      4KB

    • memory/1300-5-0x00007FF9D5DD0000-0x00007FF9D6771000-memory.dmp

      Filesize

      9.6MB

    • memory/1300-26-0x00007FF9D5DD0000-0x00007FF9D6771000-memory.dmp

      Filesize

      9.6MB

    • memory/3020-22-0x00007FF9D5DD0000-0x00007FF9D6771000-memory.dmp

      Filesize

      9.6MB

    • memory/3020-23-0x00007FF9D5DD0000-0x00007FF9D6771000-memory.dmp

      Filesize

      9.6MB

    • memory/3020-24-0x0000000000900000-0x0000000000916000-memory.dmp

      Filesize

      88KB

    • memory/3020-21-0x00007FF9D5DD0000-0x00007FF9D6771000-memory.dmp

      Filesize

      9.6MB

    • memory/3020-27-0x00007FF9D5DD0000-0x00007FF9D6771000-memory.dmp

      Filesize

      9.6MB

    • memory/3020-28-0x0000000000700000-0x0000000000708000-memory.dmp

      Filesize

      32KB