Analysis
-
max time kernel
82s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03-08-2024 03:11
Static task
static1
Behavioral task
behavioral1
Sample
rBlbqI2.exe
Resource
win7-20240704-en
General
-
Target
rBlbqI2.exe
-
Size
291KB
-
MD5
2fec9bf50de5395f799b23a1099b10d6
-
SHA1
6000969e75d7d7a3fa1b908bdb9d5daeb5f2534e
-
SHA256
df049efbfa7ac0b76c8daff5d792c550c7a7a24f6e9e887d01a01013c9caa763
-
SHA512
5f6885fb1940ee4f84507e2b7929f637d8f264a5c77329aeae31803b772608ea93370177017f90f6f8d8bc9e0b30eb8607ed120d4ead68104fd70feec71a9ab8
-
SSDEEP
6144:pdSK04ETTZ+4TBpvjLCnVlBpevKBauJirVuD05VSKJ:poL4EnU4T/vjLeVlayRihuA5D
Malware Config
Signatures
-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Renames multiple (227) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 1092 drpbx.exe -
Loads dropped DLL 1 IoCs
pid Process 2448 rBlbqI2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Frfx\\firefox.exe" rBlbqI2.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\VideoLAN\VLC\THANKS.txt.zemblax drpbx.exe File opened for modification C:\Program Files (x86)\Windows Media Player\Media Renderer\DMR_120.png drpbx.exe File created C:\Program Files\Mozilla Firefox\private_browsing.VisualElementsManifest.xml.zemblax drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\kab.txt.zemblax drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\ta.txt.zemblax drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\da.txt.zemblax drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\gu.txt.zemblax drpbx.exe File created C:\Program Files\7-Zip\Lang\ka.txt.zemblax drpbx.exe File created C:\Program Files\7-Zip\License.txt.zemblax drpbx.exe File created C:\Program Files\7-Zip\Lang\eo.txt.zemblax drpbx.exe File created C:\Program Files\7-Zip\Lang\ne.txt.zemblax drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\sv.txt.zemblax drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\THIRDPARTYLICENSEREADME.txt drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_bw120.png drpbx.exe File opened for modification C:\Program Files\7-Zip\History.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\fy.txt.zemblax drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\mng2.txt.zemblax drpbx.exe File created C:\Program Files\7-Zip\Lang\yo.txt.zemblax drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\THIRDPARTYLICENSEREADME-JAVAFX.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\ku.txt.zemblax drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.BusinessApplications.RuntimeUi.xml.zemblax drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.SharePoint.BusinessData.Administration.Client.xml.zemblax drpbx.exe File created C:\Program Files\7-Zip\Lang\eu.txt.zemblax drpbx.exe File created C:\Program Files\VideoLAN\VLC\AUTHORS.txt.zemblax drpbx.exe File created C:\Program Files\7-Zip\Lang\sw.txt.zemblax drpbx.exe File created C:\Program Files\7-Zip\Lang\uk.txt.zemblax drpbx.exe File opened for modification C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME-JAVAFX.txt drpbx.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\TableTextServiceArray.txt drpbx.exe File created C:\Program Files\RequestUnregister.js.zemblax drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color32.bmp drpbx.exe File created C:\Program Files\VideoLAN\VLC\NEWS.txt.zemblax drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\AssemblyList_4_client.xml drpbx.exe File opened for modification C:\Program Files\GetAdd.mov drpbx.exe File created C:\Program Files\7-Zip\Lang\bn.txt.zemblax drpbx.exe File created C:\Program Files\7-Zip\Lang\id.txt.zemblax drpbx.exe File created C:\Program Files\7-Zip\Lang\pa-in.txt.zemblax drpbx.exe File created C:\Program Files\7-Zip\Lang\sl.txt.zemblax drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\tk.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\ms.txt.zemblax drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt drpbx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DissolveAnother.png drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_color48.png drpbx.exe File created C:\Program Files\7-Zip\Lang\br.txt.zemblax drpbx.exe File created C:\Program Files\7-Zip\Lang\et.txt.zemblax drpbx.exe File opened for modification C:\Program Files\Java\jre7\THIRDPARTYLICENSEREADME.txt drpbx.exe File opened for modification C:\Program Files\Windows Media Player\Media Renderer\DMR_48.png drpbx.exe File created C:\Program Files\Java\jre7\Welcome.html.zemblax drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.BusinessApplications.Runtime.xml drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\eu.txt drpbx.exe File created C:\Program Files\7-Zip\Lang\lt.txt.zemblax drpbx.exe File created C:\Program Files\7-Zip\Lang\mk.txt.zemblax drpbx.exe File created C:\Program Files\7-Zip\Lang\nb.txt.zemblax drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt drpbx.exe File opened for modification C:\Program Files (x86)\Windows NT\TableTextService\TableTextServiceYi.txt drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt drpbx.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\WindowsUpdate.log ehshell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rBlbqI2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drpbx.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ehshell.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz ehshell.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ehshell.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier ehshell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1760 ehshell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1760 ehshell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2448 rBlbqI2.exe Token: SeDebugPrivilege 1092 drpbx.exe Token: SeDebugPrivilege 1760 ehshell.exe Token: SeShutdownPrivilege 1760 ehshell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2448 wrote to memory of 1092 2448 rBlbqI2.exe 30 PID 2448 wrote to memory of 1092 2448 rBlbqI2.exe 30 PID 2448 wrote to memory of 1092 2448 rBlbqI2.exe 30 PID 2448 wrote to memory of 1092 2448 rBlbqI2.exe 30 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\rBlbqI2.exe"C:\Users\Admin\AppData\Local\Temp\rBlbqI2.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe"C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\AppData\Local\Temp\rBlbqI2.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
C:\Windows\eHome\ehshell.exe"C:\Windows\eHome\ehshell.exe" /prefetch:1003 "C:\Users\Admin\Desktop\MeasureInitialize.DVR"1⤵
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
291KB
MD52fec9bf50de5395f799b23a1099b10d6
SHA16000969e75d7d7a3fa1b908bdb9d5daeb5f2534e
SHA256df049efbfa7ac0b76c8daff5d792c550c7a7a24f6e9e887d01a01013c9caa763
SHA5125f6885fb1940ee4f84507e2b7929f637d8f264a5c77329aeae31803b772608ea93370177017f90f6f8d8bc9e0b30eb8607ed120d4ead68104fd70feec71a9ab8