Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
281s -
max time network
286s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15/03/2025, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
jigsaw.exe
Resource
win7-20241010-en
Errors
General
-
Target
jigsaw.exe
-
Size
283KB
-
MD5
2773e3dc59472296cb0024ba7715a64e
-
SHA1
27d99fbca067f478bb91cdbcb92f13a828b00859
-
SHA256
3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7
-
SHA512
6ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262
-
SSDEEP
6144:7fukPLPvucHiQQQ4uuy9ApZbZWxcZt+kTfMLJTOAZiYSXjjeqXus:7fu5cCT7yYlWi8kTfMLJTOAZiYSXjyqX
Malware Config
Signatures
-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Jigsaw family
-
Renames multiple (1973) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 3012 drpbx.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Frfx\\firefox.exe" jigsaw.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\taskschd.msc mmc.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-jvmstat_zh_CN.jar drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Technic.xml drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\Presentation Designs\Maple.gif drpbx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Notes_LOOP_BG.wmv drpbx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\symbase.xml drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.net.win32.x86_64.nl_ja_4.4.0.v20140623020002.jar drpbx.exe File created C:\Program Files\Java\jre7\lib\images\cursors\win32_LinkNoDrop32x32.gif.fun drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_decreaseindent.gif.fun drpbx.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\AssemblyInfoInternal.zip.fun drpbx.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\boxed-correct.avi drpbx.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\trash.gif drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-jvmstat.jar.fun drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTaskIcon.jpg.fun drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-execution_zh_CN.jar.fun drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-host-remote_ja.jar.fun drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\feedback.gif.fun drpbx.exe File created C:\Program Files\OpenRemove.m3u.fun drpbx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\reveal_rest.png drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\WebToolIconImagesMask.bmp drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.metadata.repository.nl_zh_4.4.0.v20140623020002.jar drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\button_left_over.gif.fun drpbx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\back.png drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-openide-text.jar.fun drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\rtf_decreaseindent.gif drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightOrange\tab_on.gif.fun drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\AccessBridgeCalls.h.fun drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.di.nl_ja_4.4.0.v20140623020002.jar.fun drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-profiler.xml.fun drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-sa_ja.jar drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_blue_sun.png drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-openide-awt.jar drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsHomePageScript.js drpbx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\scenesscroll.png drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_FormsHomePageSlice.gif.fun drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\RedistList\AssemblyList_4_extended.xml drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\23.png drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\36.png drpbx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\library.js drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_Groove.gif drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-threaddump_zh_CN.jar drpbx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\button_play.png drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.runtime_3.10.0.v20140318-2214.jar.fun drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.text_3.5.300.v20130515-1451.jar drpbx.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\timeZones.js drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\js\RSSFeeds.js drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Microsoft.Office.BusinessData.xml.fun drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\ChessIconImagesMask.bmp.fun drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked-loading.png drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-first-quarter_partly-cloudy.png drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\CommsOutgoingImageMask.bmp drpbx.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveDocumentReview\ActiveTabImage.jpg drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-io-ui_zh_CN.jar drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_zh_TW.jar.fun drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\ja-JP\gadget.xml drpbx.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_box_left.png drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_decreaseindent.gif.fun drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core.xml drpbx.exe File created C:\Program Files\7-Zip\Lang\kk.txt.fun drpbx.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt drpbx.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\heart_glass_Thumbnail.bmp drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Clarity.xml.fun drpbx.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\EssentialLetter.dotx.fun drpbx.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.console_1.1.0.v20140131-1639.jar drpbx.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-modules-uihandler_ja.jar.fun drpbx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A8C4EAB1-01C2-11F0-9D46-D6B302822781} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000059fbfdcac0679d4db612dc1ce89a74df00000000020000000000106600000001000020000000d48e1802b558d33a64d7d2ecf15ece548efcfb1952b18de847212b7afe4a479f000000000e80000000020000200000000e190b04f2d5ee9fc51d4d9e9031f19d94cadd778104bf5acbaca4bd34a7118620000000f99bb3e5a24686bf6c039ccfd0ff5bd2328566af466025946063d8c1b485947f400000007f937eccc0f3512b5d184fba9624a41ccf00c6be08674c6c20aea7d830f3819cbe45e260beef7e74016bacc57610042ca03fa7cd98b17e78ed444c202d9e5f57 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c004857dcf95db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1248 taskmgr.exe 1036 mmc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 1772 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1772 AUDIODG.EXE Token: 33 1772 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1772 AUDIODG.EXE Token: SeDebugPrivilege 1248 taskmgr.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe Token: SeIncBasePriorityPrivilege 1036 mmc.exe Token: 33 1036 mmc.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 604 iexplore.exe 3012 drpbx.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe 1248 taskmgr.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 604 iexplore.exe 604 iexplore.exe 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2064 mspaint.exe 2064 mspaint.exe 2064 mspaint.exe 2064 mspaint.exe 1036 mmc.exe 1036 mmc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2396 wrote to memory of 3012 2396 jigsaw.exe 30 PID 2396 wrote to memory of 3012 2396 jigsaw.exe 30 PID 2396 wrote to memory of 3012 2396 jigsaw.exe 30 PID 604 wrote to memory of 2876 604 iexplore.exe 35 PID 604 wrote to memory of 2876 604 iexplore.exe 35 PID 604 wrote to memory of 2876 604 iexplore.exe 35 PID 604 wrote to memory of 2876 604 iexplore.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\jigsaw.exe"C:\Users\Admin\AppData\Local\Temp\jigsaw.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe"C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\AppData\Local\Temp\jigsaw.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
PID:3012
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5141⤵
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\InitializeBlock.xht1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:604 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2876
-
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Pictures\DisconnectSuspend.emf"1⤵
- Suspicious use of SetWindowsHookEx
PID:2064
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\SwitchSelect.vbs"1⤵PID:1528
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1248
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s1⤵
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1036
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2976
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1204
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD5580ee0344b7da2786da6a433a1e84893
SHA160f8c4dd5457e9834f5402cb326b1a2d3ca0ba7e
SHA25698b6c2ddfefc628d03ceaef9d69688674a6bc32eb707f9ed86bc8c75675c4513
SHA512356d2cdea3321e894b5b46ad1ea24c0e3c8be8e3c454b5bd300b7340cbb454e71fc89ca09ea0785b373b483e67c2f6f6bb408e489b0de4ff82d5ed69a75613ba
-
Filesize
71KB
MD583142242e97b8953c386f988aa694e4a
SHA1833ed12fc15b356136dcdd27c61a50f59c5c7d50
SHA256d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755
SHA512bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7781a2b60b40f8bbb87dcf8f383749b
SHA1ba9cf960a803eee72d57d67fb6f0adce97079d94
SHA256ea7e71de753a1366d8bf0f8170b9d283e3c5f54a7695a5dc82721670da48d8b6
SHA5123c9939eb15c2a6d249c99f03d9ad579a3d775315aaa01e4c7ab2c4dd03f67033003cfdc6910afeb6896c46cd4bd3b05be1adef3482c6a64c965ba984bf3170ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f6288f8f8eb371cce35e9cf471eb16b
SHA16831bcb5dcf6035d5df8728ad63022f2701b239d
SHA256097a3686bd06330cddf95bd4b17661d6197c88ba88bac73059c522a531928b1a
SHA512daf3a755ba6b5e37743dd8aa3d61c85481440487f2b9b5f9794dfb50a956d14c4ff84623dd2f6baf2060a8f708105eb02a5c9be5c6cc2433e0ee9bed47b04d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e426349c9caf330b6621d89e1271e3f4
SHA1b0bcc5e993e13b5bccd01b61e9f3eeb91503bc1c
SHA25626f3c8c300ef1542d2fe93a89c17ef7283c34cdc58c638e7592f1285e3f461f2
SHA512b9138482885a40ab305d83a25d4e8c2f373e9100b4d76773e057c5c35f738c248f6db71a3c5b4260409ecc93724fed128c408a9b3b88c1de4638b24e2723d190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7a2ed01a09bc69bd7f99eea3b38fc1f
SHA12b24706489d16b7cba567a67c0b44143648e2051
SHA256b423e6ee2a49e9cfcc7311734b54427622ec54746913eb2c3197ba1f103f2d79
SHA512a8317f61d9204bf5343c23f5cc98c48017517d763ca824f71ad80b86eac7eb00aedd51e6b0fb652707d9d476f93391095b49112bbdc0cb4e308400095dd6f224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56055185248290db727cedd2910bf1c09
SHA1dd21fd471399f650a95818d94c4600fb2ace7d22
SHA25621c3acd82feaad22208da42aa71edee767c4d9407d054b8f2e8e212394a46098
SHA512fdb478a0a8df3f62f1f8b6d88672f387762ff730c9c3cfc30b45c67b0eb9c9cd94e9dc2c3b99cafada95b8201ea24498d4671d6e1d104ac3d250ccb6719a40e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5069901438ef5acd83096b9e649b3cbf6
SHA1158e442061b338ee55a15572e0b4c44c87f29fbc
SHA2568e66678c3f90436296b95cd5084d5cf81299a6c5721915c904a96d1672b58122
SHA5129518154c1190936827610d963ba050926041b86ffa14ad59f3a852eb54c984ac3cde56da1ad41bee30fbc2a2b71b32f079809d3423c5db24a88b3b9df4fddaca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5665e3883dae5f7bbff164ee213c6d1ba
SHA12325afe02417d25efaed47ed73afface3826d63d
SHA25605a838559c2a67666f7194e027cae7cc2a2673f82b20f0a9036105d75b07f32e
SHA512badb92dc9370785378e7b2e161d32ee1a7d01ea0759dcca38611e638f913d25c69ca1d88e7dbb75eefd05ede023d5af257d7a3a031e6ce6541aa80077dcdef2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5349e73c43ba5f26aa1b7d059bf3b537b
SHA1de9b585a211ba560e798157bffaaaa8a6198b074
SHA25642d063d79cc2572fc42c5d830aeddce200b3203c0a63250dc0e187d54cd6bdb4
SHA512792d23fbc82e24b1255f658feb7369c8dc366326bdeb866d368320dc0c30b1685f206bbe9ded970486cff9eefda0fbfaf89747f4f3437f400123f0b46c492676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53527bf1c085d55aaa095f70a2364d2d7
SHA1f3fbc1d27b579d640bc238d65dc0d0411f5dd9b5
SHA256fb0d2f4da753f32e62a8161249c6496c9aa6db4c7726863b233cd7b424810d23
SHA5124a91629b91b76e3466f8f813daf2dc3da6c4114ff232bd6f711462dab39d9cce3db9016b88b54d2a0cc2993be7e0ba2382783b6d3ed51c1f0374c49142fe0866
-
Filesize
283KB
MD52773e3dc59472296cb0024ba7715a64e
SHA127d99fbca067f478bb91cdbcb92f13a828b00859
SHA2563ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7
SHA5126ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{EE737ED0-86E5-11EF-B2CD-DAB21757C799}.dat
Filesize5KB
MD52e622c1f114be9451445397c6c6e854d
SHA1a949835f96afff0dca951f1c22d49a7a82bad548
SHA256754d8d865693693323fd09e9d921566e03d844cd8acfe2dcb394da7125354146
SHA512ebfc22238bf5290e2232f2b95dbae3d432b169f05532ed1984e445cd6289b33a435959275ce0e2c9b925215dd0a2a1179bee087a1989cfdb0a25a1834d2e5834
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{A8C4EAB4-01C2-11F0-9D46-D6B302822781}.dat
Filesize4KB
MD56e1e5897294f0726e71cc0e7ef0edbf8
SHA1abcd75ad84077bb4f5c56672c3f4f0bb860c36ab
SHA2566c01ad3b89a91f32aa4bcbbedec3f05dd379fc2f653f40fc53b23dd5033bda44
SHA51219c7381729b9e05c2126c5140d0ac9bd8419e6afae5e3199830ae347d72d2c67ad7c0c17aaf44a4384fc9436bd5b0190744c09c9d64bd970f64aa537db53183b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
183KB
MD5109cab5505f5e065b63d01361467a83b
SHA14ed78955b9272a9ed689b51bf2bf4a86a25e53fc
SHA256ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673
SHA512753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc
-
Filesize
16B
MD58ebcc5ca5ac09a09376801ecdd6f3792
SHA181187142b138e0245d5d0bc511f7c46c30df3e14
SHA256619e246fc0ac11320ff9e322a979948d949494b0c18217f4d794e1b398818880
SHA512cec50bfc6ad2f57f16da99459f40f2d424c6d5691685fa1053284f46c8c8c8a975d7bcb1f3521c4f3fbdc310cf4714e29404aa23be6021e2e267c97b090dc650