Resubmissions

06-12-2024 18:24

241206-w2jhxs1jax 10

06-12-2024 18:22

241206-wzy6lawnen 7

06-12-2024 18:15

241206-wwd19azqas 9

06-12-2024 18:09

241206-wrmgtszngy 6

Analysis

  • max time kernel
    110s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2024 18:24

General

  • Target

    https://github.com/kh4sh3i/Ransomware-Samples

Malware Config

Signatures

  • Jigsaw Ransomware

    Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.

  • Jigsaw family
  • Renames multiple (741) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 42 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/kh4sh3i/Ransomware-Samples
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4932
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffff0e8cc40,0x7ffff0e8cc4c,0x7ffff0e8cc58
      2⤵
        PID:1952
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2004,i,13122260769285777280,1671000734356384110,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1992 /prefetch:2
        2⤵
          PID:2888
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1864,i,13122260769285777280,1671000734356384110,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2204 /prefetch:3
          2⤵
            PID:476
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,13122260769285777280,1671000734356384110,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2608 /prefetch:8
            2⤵
              PID:2960
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,13122260769285777280,1671000734356384110,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3144 /prefetch:1
              2⤵
                PID:3800
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,13122260769285777280,1671000734356384110,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3408 /prefetch:1
                2⤵
                  PID:1332
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4432,i,13122260769285777280,1671000734356384110,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4632 /prefetch:8
                  2⤵
                    PID:756
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4916,i,13122260769285777280,1671000734356384110,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4340 /prefetch:8
                    2⤵
                      PID:3568
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                    1⤵
                      PID:216
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                      1⤵
                        PID:704
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:2344
                        • C:\Users\Admin\Downloads\jigsaw.exe
                          "C:\Users\Admin\Downloads\jigsaw.exe"
                          1⤵
                          • Adds Run key to start application
                          PID:3896
                          • C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe
                            "C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\Downloads\jigsaw.exe
                            2⤵
                            • Executes dropped EXE
                            • Drops file in Program Files directory
                            PID:4532
                        • C:\Users\Admin\Downloads\jigsaw.exe
                          "C:\Users\Admin\Downloads\jigsaw.exe"
                          1⤵
                          • Adds Run key to start application
                          PID:1220
                        • C:\Program Files\VideoLAN\VLC\vlc.exe
                          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\OptimizeExport.mpe"
                          1⤵
                          • Suspicious behavior: AddClipboardFormatListener
                          • Suspicious behavior: GetForegroundWindowSpam
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          • Suspicious use of SetWindowsHookEx
                          PID:3928
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Downloads\UnblockEnable.html
                          1⤵
                            PID:4808
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0xf8,0x134,0x7fffd02346f8,0x7fffd0234708,0x7fffd0234718
                              2⤵
                                PID:1056
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,11260808142948716668,256845364118317640,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:2
                                2⤵
                                  PID:4784
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,11260808142948716668,256845364118317640,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:3
                                  2⤵
                                    PID:5036
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,11260808142948716668,256845364118317640,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:8
                                    2⤵
                                      PID:3212
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,11260808142948716668,256845364118317640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:1
                                      2⤵
                                        PID:1752
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,11260808142948716668,256845364118317640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:1
                                        2⤵
                                          PID:3648
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:4732
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:5056

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe

                                            Filesize

                                            283KB

                                            MD5

                                            2773e3dc59472296cb0024ba7715a64e

                                            SHA1

                                            27d99fbca067f478bb91cdbcb92f13a828b00859

                                            SHA256

                                            3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7

                                            SHA512

                                            6ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\0fe18321-72cc-4209-ac34-9fea4b5c8a0a.tmp

                                            Filesize

                                            10KB

                                            MD5

                                            16a711dabf2c0ddde98b62b5368b92df

                                            SHA1

                                            4cf84f0ecd60186c81c44f83f194b373d11e2912

                                            SHA256

                                            b5c36d3dc1287af8c56a5256162b5351e58d3ab357c55917745e94903ec91dfe

                                            SHA512

                                            f21d1c6d0e1af9c829c27ae4ee012c4d5beb6e909b01f03ec8736d491381ac0743eca2fbff47b3abd33fc545d90526005b809a961121ae239429707186cd3bb8

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                            Filesize

                                            649B

                                            MD5

                                            0a4208cfc5903c41e26401b03cf2b4e8

                                            SHA1

                                            f6bc9a520960f9e7937adc4b6eaf690b0c3cb02e

                                            SHA256

                                            cd7c179a53e50a73ae2278e97dbd0786f54112c25891dc3e574f5acc0b9b39d2

                                            SHA512

                                            88068a6a54cf8850dca7edcdfad987da724c9b2a1aff4e1018dc48c70bb426cb0530f54d1abd3184bd92bfbb3f1b1d1dbcd7d5d23380d6e3110073aaf6b0855e

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                            Filesize

                                            2KB

                                            MD5

                                            730a8a77629404e79021fcfc2b700405

                                            SHA1

                                            13b46ad642a46fe1f806f31bdc7ed4316e498de1

                                            SHA256

                                            a6c4fdfc30b10f9e9b2944a5bee544006f49f185199d9b55d1c6ce6dd4634fbc

                                            SHA512

                                            e9158d985e117c5290c66abf07c9cf8e4cdbece24fec39261d5c2ea77b8ffd635c418faca565d5a3e9bd25bde88b19456b19721bfc64baa39fed366bbf5a08a8

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\DawnCache\data_1

                                            Filesize

                                            264KB

                                            MD5

                                            e745dd941628fcc8f5564e70d5984186

                                            SHA1

                                            f2dd1824d4802f285ccc1ac6656c2bb0a8f4f408

                                            SHA256

                                            4ff2faa21f5adbaad051bdfcf9b76e74213b3d876d698cc2e3e1a538ecd6d691

                                            SHA512

                                            9c16b6c2fc8a735f53655f1317a1aa0e0c4e5635bfacdbc7dc05a6b487c972fe950683f3504a4e368794e36e6c2017f554780b2947fe0717f91dfcb283eea549

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                            Filesize

                                            2KB

                                            MD5

                                            95c2a7ef801534243a2ded94aed5da62

                                            SHA1

                                            da91ab581f3f2fc4f9fda2d1e0c27d62063fd3a5

                                            SHA256

                                            de9104a0efb654c42b23ec848b2667352d8c83304bf48fae835cb54db4424ff4

                                            SHA512

                                            d0310e7ad45bb07b7a7f5eaa2a86f6c6f0fb1be5a53b048fab1bc9fb68c8812777fb108097c3b75b8a40f101a81f23d87be88645658f01913b88ce7862feda2c

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                            Filesize

                                            2KB

                                            MD5

                                            21a215f22b9cf388fecb565b19c212b2

                                            SHA1

                                            826f95282523a3aad895b76a80fca4fd9ed2cbde

                                            SHA256

                                            aca271353410e04557a8284dcfd4a8dcf4c57586f2a039886bdc779892b1deb5

                                            SHA512

                                            24a061d9050f3d8db3c4cf7157a016ca8c9981e07bf4cdf109ea9aa809e41120eff73b97d6c80b71c5b083d1bc3b197c4103f77742ef1afcdcd823656a3888c4

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                            Filesize

                                            2B

                                            MD5

                                            d751713988987e9331980363e24189ce

                                            SHA1

                                            97d170e1550eee4afc0af065b78cda302a97674c

                                            SHA256

                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                            SHA512

                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                            Filesize

                                            1KB

                                            MD5

                                            d644f214531398087277c346714828ab

                                            SHA1

                                            908f363a1c1d155ff417a6b33b6133b8e63bb185

                                            SHA256

                                            9d27e9333dd42efa6316cb9e6d4e90bc8645d62d1d98fd4e30b998f6743f90a4

                                            SHA512

                                            ff6d84baf782c807dd3cedcdf2228251347b939fe7b9d26da6b890ccd9dc8525c23b87168f0676b072418fe2b58bebf5e8d879431fef015e7819fde3ba4f6f7f

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                            Filesize

                                            1KB

                                            MD5

                                            834bb51ab142e42ae444461b6184006d

                                            SHA1

                                            8ab074f9d4dba38bcdce36fddea6e600389e3a5b

                                            SHA256

                                            35fac0a786fbf9ec650c7c5f83e84ca42b7d40da34d56896c9dcabcc93f8871b

                                            SHA512

                                            b8402d57a63144a2a3a51f57b532c310e497ce6c7893dcf9a46255d4b827c1245f021411362cff956b2cb02f125975d4aebb60c08383b2916b45d1a1ad2c2bf7

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            79a370aaef5e6c29a5dfa625453ff06b

                                            SHA1

                                            3ef6fca46e403b375a7cd94ba794e3696c93d123

                                            SHA256

                                            a96b887494d47ada5d57be6ba5a3ab813c5572eded3b1c4bf063e62665af5fcd

                                            SHA512

                                            beffa58ca850b72e274fc0caecfea45e720f782ad76963f7fdbb835f990dcebc2005f7d91e7795764eac255bde1e517b293189810971651a619f3f2f7f51e5ee

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            9KB

                                            MD5

                                            d5ee7d6743c3047597cdc6e96ace533a

                                            SHA1

                                            f5bb20d59b4b4e4cfd3c857760e2e5ba19de8120

                                            SHA256

                                            9feb55b72b0cf490ed45744dd5310c9b69aa3a98beb6f4e8be1a4b3f5abc7a32

                                            SHA512

                                            3ea5f3582a28fa3ff1c04c18ece77a0a819032b0034184d26a8c96eb69f4d7251eb2421f86005103966d09d0023fc00a7325302e40c0183c5bfb8a8ba26c23a3

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            10KB

                                            MD5

                                            3144da8afcbe071e8e5e87fd4fc4c4c3

                                            SHA1

                                            3c095251a5ed8a0440a6b213155c3062cda3cc2b

                                            SHA256

                                            5fd8130e010d9e6bd6ff0b1211defae646386c2cb069c91446437e4f8ba32a79

                                            SHA512

                                            4ce8df9a226849434758977178142b42cb98e694b450689938aa82f4e6984815db0d98cabfd147832e74bdde7fdb8f318bd1fa3ade781b22fa7bd9992ddecc6c

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                            Filesize

                                            10KB

                                            MD5

                                            8af2937cf58e6c497e22273e6b17b1a0

                                            SHA1

                                            4d48d1bffee9faed392a2becac0228b99068270c

                                            SHA256

                                            d28f88779fa0cc7eb8583e750b0a590b1eeb5a87d6996fe932b4bf7f7f9a7796

                                            SHA512

                                            9905ae293fb6e5d77c3472144ae906aebceb932dfd205ca5f91e24ae731fad39c3ccf3aeafb02964f5c6c36398a6519ee7472b99237efd792f10460c7b24cc1d

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                            Filesize

                                            116KB

                                            MD5

                                            b9a278e53fbd2fad04d17a81db83d1d3

                                            SHA1

                                            5e743a74385e2dbe8a54edebe71605536f2328b7

                                            SHA256

                                            0bdb1ceed7278137e350263f4e62a85f2cb0696641d25dd51b4166b63e3fb131

                                            SHA512

                                            b9d25be97083dd8a04230c6b1ef46838861980d659d634f3f15acc4c45e78b679a593dacf2561de0873de5b6caa9a30faaa5c6182ba7a216fef3e9ceb840f1ec

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                            Filesize

                                            116KB

                                            MD5

                                            aaf0cd3f875aadbf5ac3bb6310a95283

                                            SHA1

                                            5dd95c63709a0d1d2555dcce4e647bb8b03d4cc1

                                            SHA256

                                            92f446f36da9ed921573053d9c49787428ba6155e42b10d16e788ef842c01d89

                                            SHA512

                                            b116032bb486117505ec58713e10c733d821d230d713a746f4ffebc605be5473e8c0836d2c8065c3da48c41226aa9e92da8fda76a3a19b5cd1d77048a36149f7

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                            Filesize

                                            116KB

                                            MD5

                                            7dbd7f97fea6130ff5c7c564b61a7114

                                            SHA1

                                            737a598837a0bfc0f479da1845c6ff45c32cabc0

                                            SHA256

                                            c9d1345760c8b47f69b5d166ef75661f8a3e44c83fec28a27127422b8c73a342

                                            SHA512

                                            0db574b794257afcd74b5176a2162448c57cd2ef0025c8c951b780a261fc6a2469d27518402f5eb06097755eaf5f230219ab0ad218096be73502d32b11e522b6

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\jigsaw.exe.log

                                            Filesize

                                            430B

                                            MD5

                                            de04f2e81c0501dee6d2f449fb6f3885

                                            SHA1

                                            761a51e13b7958c5ec2e51de258428eedec0ae51

                                            SHA256

                                            92e5dd3c966959c5a39d98226668f5a2745e16db2ebf034eb5ee5d5f160ed8bb

                                            SHA512

                                            65e64986ec8b0681d72b7ec9590abe4ed443be492a4085dc4d9a6428e8f2e92d9bf46733f95bdf6de8e9efc97f035ab66d4400e83ac75d359dacecd7870161a8

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            e443ee4336fcf13c698b8ab5f3c173d0

                                            SHA1

                                            9bf70b16f03820cbe3158e1f1396b07b8ac9d75a

                                            SHA256

                                            79e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b

                                            SHA512

                                            cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            56a4f78e21616a6e19da57228569489b

                                            SHA1

                                            21bfabbfc294d5f2aa1da825c5590d760483bc76

                                            SHA256

                                            d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb

                                            SHA512

                                            c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            071f2dd33198557eededc54cee62fba5

                                            SHA1

                                            9822191e3412720dd508c9176bd32f739e3eba94

                                            SHA256

                                            eb9da493d08e91ee9553cb02feb78ab0e443f4389179cbc2fcda04dee6aa99a5

                                            SHA512

                                            99fc66931988a5f9fba4a416cd8f054efd68bd399625e6ed03a4cbc444f9b44a894df8f18a89145f45be3d14a51c91eb963b5930942e8f86d0bf1c226b0d2cf5

                                          • C:\Users\Admin\AppData\Local\Temp\{63D76301-76A2-439C-B8EA-9DEDB62567A9} - OProcSessId.dat.fun

                                            Filesize

                                            16B

                                            MD5

                                            8ebcc5ca5ac09a09376801ecdd6f3792

                                            SHA1

                                            81187142b138e0245d5d0bc511f7c46c30df3e14

                                            SHA256

                                            619e246fc0ac11320ff9e322a979948d949494b0c18217f4d794e1b398818880

                                            SHA512

                                            cec50bfc6ad2f57f16da99459f40f2d424c6d5691685fa1053284f46c8c8c8a975d7bcb1f3521c4f3fbdc310cf4714e29404aa23be6021e2e267c97b090dc650

                                          • C:\Users\Admin\Downloads\Ransomware.Jigsaw.zip

                                            Filesize

                                            239KB

                                            MD5

                                            3ad6374a3558149d09d74e6af72344e3

                                            SHA1

                                            e7be9f22578027fc0b6ddb94c09b245ee8ce1620

                                            SHA256

                                            86a391fe7a237f4f17846c53d71e45820411d1a9a6e0c16f22a11ebc491ff9ff

                                            SHA512

                                            21c21b36be200a195bfa648e228c64e52262b06d19d294446b8a544ff1d81f81eb2af74ddbdebc59915168db5dba76d0f0585e83471801d9ee37e59af0620720

                                          • memory/3896-276-0x00007FFFDBA50000-0x00007FFFDC3F1000-memory.dmp

                                            Filesize

                                            9.6MB

                                          • memory/3896-262-0x000000001C2E0000-0x000000001C37C000-memory.dmp

                                            Filesize

                                            624KB

                                          • memory/3896-261-0x000000001BD70000-0x000000001C23E000-memory.dmp

                                            Filesize

                                            4.8MB

                                          • memory/3896-260-0x00000000012B0000-0x00000000012E8000-memory.dmp

                                            Filesize

                                            224KB

                                          • memory/3896-259-0x00007FFFDBA50000-0x00007FFFDC3F1000-memory.dmp

                                            Filesize

                                            9.6MB

                                          • memory/3896-258-0x00007FFFDBA50000-0x00007FFFDC3F1000-memory.dmp

                                            Filesize

                                            9.6MB

                                          • memory/3896-257-0x00007FFFDBD05000-0x00007FFFDBD06000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/3928-878-0x00007FFFE1150000-0x00007FFFE1406000-memory.dmp

                                            Filesize

                                            2.7MB

                                          • memory/3928-907-0x00007FFFE0370000-0x00007FFFE0381000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/3928-881-0x00007FFFF0C90000-0x00007FFFF0CB2000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/3928-879-0x00007FFFF6980000-0x00007FFFF6991000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/3928-885-0x00007FFFF1550000-0x00007FFFF1561000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/3928-884-0x00007FFFF27F0000-0x00007FFFF2804000-memory.dmp

                                            Filesize

                                            80KB

                                          • memory/3928-883-0x00007FFFE0DC0000-0x00007FFFE1150000-memory.dmp

                                            Filesize

                                            3.6MB

                                          • memory/3928-886-0x00007FFFF05B0000-0x00007FFFF0682000-memory.dmp

                                            Filesize

                                            840KB

                                          • memory/3928-887-0x00007FFFE0B20000-0x00007FFFE0DB6000-memory.dmp

                                            Filesize

                                            2.6MB

                                          • memory/3928-888-0x00007FFFE0A30000-0x00007FFFE0B18000-memory.dmp

                                            Filesize

                                            928KB

                                          • memory/3928-896-0x00007FFFE08D0000-0x00007FFFE08E1000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/3928-897-0x00007FFFE08B0000-0x00007FFFE08C1000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/3928-898-0x00007FFFE06A0000-0x00007FFFE08AB000-memory.dmp

                                            Filesize

                                            2.0MB

                                          • memory/3928-895-0x00007FFFE08F0000-0x00007FFFE090A000-memory.dmp

                                            Filesize

                                            104KB

                                          • memory/3928-905-0x00007FFFE0470000-0x00007FFFE0481000-memory.dmp

                                            Filesize

                                            68KB

                                          • memory/3928-908-0x00007FFFE0350000-0x00007FFFE0367000-memory.dmp

                                            Filesize

                                            92KB

                                          • memory/3928-909-0x00007FFFD4110000-0x00007FFFD4355000-memory.dmp

                                            Filesize

                                            2.3MB

                                          • memory/3928-882-0x00007FFFF0A00000-0x00007FFFF0A2B000-memory.dmp

                                            Filesize

                                            172KB

                                          • memory/3928-906-0x00007FFFE0390000-0x00007FFFE046F000-memory.dmp

                                            Filesize

                                            892KB

                                          • memory/3928-904-0x00007FFFE0490000-0x00007FFFE04A2000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/3928-903-0x00007FFFE04B0000-0x00007FFFE04CB000-memory.dmp

                                            Filesize

                                            108KB

                                          • memory/3928-902-0x00007FFFE04D0000-0x00007FFFE057B000-memory.dmp

                                            Filesize

                                            684KB

                                          • memory/3928-901-0x00007FFFE0580000-0x00007FFFE05A5000-memory.dmp

                                            Filesize

                                            148KB

                                          • memory/3928-900-0x00007FFFE05B0000-0x00007FFFE05FF000-memory.dmp

                                            Filesize

                                            316KB

                                          • memory/3928-899-0x00007FFFE0600000-0x00007FFFE0698000-memory.dmp

                                            Filesize

                                            608KB

                                          • memory/3928-894-0x00007FFFE0910000-0x00007FFFE093D000-memory.dmp

                                            Filesize

                                            180KB

                                          • memory/3928-893-0x00007FFFF0490000-0x00007FFFF04B6000-memory.dmp

                                            Filesize

                                            152KB

                                          • memory/3928-892-0x00007FFFF10A0000-0x00007FFFF10B8000-memory.dmp

                                            Filesize

                                            96KB

                                          • memory/3928-891-0x00007FFFF04F0000-0x00007FFFF051F000-memory.dmp

                                            Filesize

                                            188KB

                                          • memory/3928-890-0x00007FFFECC80000-0x00007FFFECCC1000-memory.dmp

                                            Filesize

                                            260KB

                                          • memory/3928-889-0x00007FFFE0940000-0x00007FFFE0A23000-memory.dmp

                                            Filesize

                                            908KB

                                          • memory/3928-880-0x00007FFFF59C0000-0x00007FFFF59D9000-memory.dmp

                                            Filesize

                                            100KB

                                          • memory/3928-877-0x00007FFFF42F0000-0x00007FFFF4324000-memory.dmp

                                            Filesize

                                            208KB

                                          • memory/3928-876-0x00007FF65E570000-0x00007FF65E668000-memory.dmp

                                            Filesize

                                            992KB

                                          • memory/4532-287-0x0000000000E10000-0x0000000000E18000-memory.dmp

                                            Filesize

                                            32KB