File name:

2773e3dc59472296cb0024ba7715a64e.exe

Full analysis: https://app.any.run/tasks/aba6f815-dec8-4c76-a884-712f2324ab07
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: December 14, 2024, 11:32:47
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
jigsaw
ransomware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 5 sections
MD5:

2773E3DC59472296CB0024BA7715A64E

SHA1:

27D99FBCA067F478BB91CDBCB92F13A828B00859

SHA256:

3AE96F73D805E1D3995253DB4D910300D8442EA603737A1428B613061E7F61E7

SSDEEP:

6144:7fukPLPvucHiQQQ4uuy9ApZbZWxcZt+kTfMLJTOAZiYSXjjeqXusy:7fu5cCT7yYlWi8kTfMLJTOAZiYSXjyqO

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • JIGSAW has been detected

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 640)
    • Changes the autorun value in the registry

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 640)
    • RANSOMWARE has been detected

      • drpbx.exe (PID: 6376)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 640)
    • Reads the date of Windows installation

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 640)
    • Executable content was dropped or overwritten

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 640)
    • Starts itself from another location

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 640)
    • Creates file in the systems drive root

      • drpbx.exe (PID: 6376)
  • INFO

    • Creates files or folders in the user directory

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 640)
    • Checks supported languages

      • drpbx.exe (PID: 6376)
      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 640)
    • Process checks computer location settings

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 640)
    • Reads the computer name

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 640)
      • drpbx.exe (PID: 6376)
    • The process uses the downloaded file

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 640)
    • Creates files in the program directory

      • drpbx.exe (PID: 6376)
    • Reads the machine GUID from the registry

      • drpbx.exe (PID: 6376)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (61.6)
.dll | Win32 Dynamic Link Library (generic) (14.6)
.exe | Win32 Executable (generic) (10)
.exe | Win16/32 Executable Delphi generic (4.6)
.exe | Generic Win/DOS Executable (4.4)

EXIF

EXE

AssemblyVersion: 37.0.2.5583
ProductVersion: 37.0.2.5583
ProductName: Firefox
OriginalFileName: BitcoinBlackmailer.exe
LegalTrademarks: -
LegalCopyright: Copyright 1999-2012 Firefox and Mozzilla developers. All rights reserved.
InternalName: BitcoinBlackmailer.exe
FileVersion: 37.0.2.5583
FileDescription: Firefox
CompanyName: -
Comments: -
CharacterSet: Unicode
LanguageCode: Neutral
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 37.0.2.5583
FileVersionNumber: 37.0.2.5583
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0x4e00a
UninitializedDataSize: -
InitializedDataSize: 216576
CodeSize: 72704
LinkerVersion: 8
PEType: PE32
ImageFileCharacteristics: Executable, 32-bit
TimeStamp: 2016:03:31 06:28:14+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
127
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #JIGSAW 2773e3dc59472296cb0024ba7715a64e.exe THREAT drpbx.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
640"C:\Users\admin\AppData\Local\Temp\2773e3dc59472296cb0024ba7715a64e.exe" C:\Users\admin\AppData\Local\Temp\2773e3dc59472296cb0024ba7715a64e.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
37.0.2.5583
Modules
Images
c:\users\admin\appdata\local\temp\2773e3dc59472296cb0024ba7715a64e.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6376"C:\Users\admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\admin\AppData\Local\Temp\2773e3dc59472296cb0024ba7715a64e.exeC:\Users\admin\AppData\Local\Drpbx\drpbx.exe
2773e3dc59472296cb0024ba7715a64e.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Firefox
Version:
37.0.2.5583
Modules
Images
c:\users\admin\appdata\local\drpbx\drpbx.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
3 270
Read events
3 269
Write events
1
Delete events
0

Modification events

(PID) Process:(640) 2773e3dc59472296cb0024ba7715a64e.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:firefox.exe
Value:
C:\Users\admin\AppData\Roaming\Frfx\firefox.exe
Executable files
2
Suspicious files
26
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6376drpbx.exeC:\Users\admin\Desktop\appliedso.png.funbinary
MD5:AE57075A34FCC81AA0F77728AB46ACEA
SHA256:7341ACDB9B21750C473944B857205DB72474DC750E20F7C08D8059518F939A15
6376drpbx.exeC:\Users\admin\Documents\weighthorse.rtf.funbinary
MD5:4EAD6EC1B345049B1298158E6939F5C6
SHA256:58FB20B1DA8A66FFD94B94D9DB15DCF199B5E4749A41C9318F52AC393E39DBEA
6376drpbx.exeC:\Users\admin\Desktop\exhighly.rtf.funbinary
MD5:9B2C25132804681E9AC841393C644760
SHA256:0E87F1B5B39D4920AD132C4589C344BC40337D11AF5D7D924EDA030C6E078D7F
6376drpbx.exeC:\Users\admin\Documents\houseeur.rtf.funbinary
MD5:9038565A05FE7F779983D1EF6E480BFF
SHA256:2BFBF082A3D3C50F353F732624E2DDF073A342E0D598905DD4C08590645BD017
6376drpbx.exeC:\Users\admin\Desktop\playearly.png.funbinary
MD5:65326630BFAD73E1369D2F63C3272B91
SHA256:D5C59F4B40E62EC6320F2FD54E68B4B09E6F1661761FC42DC55E600A9A18D655
6376drpbx.exeC:\Users\admin\Documents\providedavailable.rtf.funbinary
MD5:1D4AA03EA06AC183AD442E2F2024BC36
SHA256:32C8A5F2C539F40289577E90A81C5546C968CA4A8303E7D9EDE21B4C38C7E0FB
6402773e3dc59472296cb0024ba7715a64e.exeC:\Users\admin\AppData\Local\Drpbx\drpbx.exeexecutable
MD5:2773E3DC59472296CB0024BA7715A64E
SHA256:3AE96F73D805E1D3995253DB4D910300D8442EA603737A1428B613061E7F61E7
6402773e3dc59472296cb0024ba7715a64e.exeC:\Users\admin\AppData\Roaming\Frfx\firefox.exeexecutable
MD5:2773E3DC59472296CB0024BA7715A64E
SHA256:3AE96F73D805E1D3995253DB4D910300D8442EA603737A1428B613061E7F61E7
6376drpbx.exeC:\Users\admin\Desktop\itideas.rtf.funbinary
MD5:CBC8EDF451FE2F726BD0611E36D7A17C
SHA256:029F061D0A17E1561FEE2B38DDAAC3334C158EB3984067A4BEFD47599B0241A7
6376drpbx.exeC:\Users\admin\Documents\forestpretty.rtf.funbinary
MD5:193E7E5BD78AD3375037B6B8FBE887A4
SHA256:BB143F50BA5F075C13E42238BC7B66DF9AD039F28D369E91C94A5C681AAACBE3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
32
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7104
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6280
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6280
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
7104
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
104.126.37.154:443
www.bing.com
Akamai International B.V.
DE
whitelisted
1176
svchost.exe
40.126.32.136:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1076
svchost.exe
23.213.166.81:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 172.217.18.14
whitelisted
www.bing.com
  • 104.126.37.154
  • 104.126.37.162
  • 104.126.37.163
  • 104.126.37.155
  • 104.126.37.177
  • 104.126.37.161
  • 104.126.37.179
  • 104.126.37.171
  • 104.126.37.139
whitelisted
login.live.com
  • 40.126.32.136
  • 40.126.32.133
  • 40.126.32.140
  • 20.190.160.22
  • 40.126.32.74
  • 20.190.160.14
  • 40.126.32.68
  • 40.126.32.76
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 23.213.166.81
whitelisted
arc.msn.com
  • 20.31.169.57
whitelisted
fd.api.iris.microsoft.com
  • 20.103.156.88
whitelisted

Threats

No threats detected
No debug info