Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/03/2025, 03:38 UTC

General

  • Target

    jigsaw.exe

  • Size

    283KB

  • MD5

    2773e3dc59472296cb0024ba7715a64e

  • SHA1

    27d99fbca067f478bb91cdbcb92f13a828b00859

  • SHA256

    3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7

  • SHA512

    6ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262

  • SSDEEP

    6144:7fukPLPvucHiQQQ4uuy9ApZbZWxcZt+kTfMLJTOAZiYSXjjeqXus:7fu5cCT7yYlWi8kTfMLJTOAZiYSXjyqX

Malware Config

Signatures

  • Jigsaw Ransomware

    Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.

  • Jigsaw family
  • Renames multiple (2003) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\jigsaw.exe
    "C:\Users\Admin\AppData\Local\Temp\jigsaw.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe
      "C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\AppData\Local\Temp\jigsaw.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:2816

Network

  • flag-us
    DNS
    btc.blockr.io
    drpbx.exe
    Remote address:
    8.8.8.8:53
    Request
    btc.blockr.io
    IN A
    Response
No results found
  • 8.8.8.8:53
    btc.blockr.io
    dns
    drpbx.exe
    59 B
    125 B
    1
    1

    DNS Request

    btc.blockr.io

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\invalid32x32.gif.fun

    Filesize

    160B

    MD5

    580ee0344b7da2786da6a433a1e84893

    SHA1

    60f8c4dd5457e9834f5402cb326b1a2d3ca0ba7e

    SHA256

    98b6c2ddfefc628d03ceaef9d69688674a6bc32eb707f9ed86bc8c75675c4513

    SHA512

    356d2cdea3321e894b5b46ad1ea24c0e3c8be8e3c454b5bd300b7340cbb454e71fc89ca09ea0785b373b483e67c2f6f6bb408e489b0de4ff82d5ed69a75613ba

  • C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe

    Filesize

    283KB

    MD5

    2773e3dc59472296cb0024ba7715a64e

    SHA1

    27d99fbca067f478bb91cdbcb92f13a828b00859

    SHA256

    3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7

    SHA512

    6ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DNTException\container.dat.fun

    Filesize

    16B

    MD5

    8ebcc5ca5ac09a09376801ecdd6f3792

    SHA1

    81187142b138e0245d5d0bc511f7c46c30df3e14

    SHA256

    619e246fc0ac11320ff9e322a979948d949494b0c18217f4d794e1b398818880

    SHA512

    cec50bfc6ad2f57f16da99459f40f2d424c6d5691685fa1053284f46c8c8c8a975d7bcb1f3521c4f3fbdc310cf4714e29404aa23be6021e2e267c97b090dc650

  • memory/2624-3-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2624-0-0x000007FEF553E000-0x000007FEF553F000-memory.dmp

    Filesize

    4KB

  • memory/2624-10-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2624-1-0x0000000000510000-0x0000000000548000-memory.dmp

    Filesize

    224KB

  • memory/2624-2-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2816-11-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2816-12-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2816-13-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2816-2024-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2816-2027-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2816-2029-0x000007FEF5280000-0x000007FEF5C1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2816-2030-0x000000001C160000-0x000000001C1D2000-memory.dmp

    Filesize

    456KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.