File name:

jogsaw.zip

Full analysis: https://app.any.run/tasks/54e0cd53-4371-4817-96ac-2bb67fdd3021
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: July 19, 2024, 15:07:57
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
mircop
ransomware
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

50347E22D80A650CE52EBDA765AE24EC

SHA1:

D6A8F0709D9033E42A62B70BD468CCE904043B38

SHA256:

4B3B62662C1D38DF2F0EE416772A6A3BDFECFE8BB64B725E93BD8A933E441487

SSDEEP:

12288:plYj/SznoASYnCtnHumvkzKbOV7lxGenLOvwkD:plMKznoASYCtnHBkzsO9BLOvwkD

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3800)
      • a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710.exe (PID: 3044)
      • drpbx.exe (PID: 7804)
    • Changes the autorun value in the registry

      • a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710.exe (PID: 3044)
    • MIRCOP has been detected

      • drpbx.exe (PID: 7804)
    • Actions looks like stealing of personal data

      • drpbx.exe (PID: 7804)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710.exe (PID: 3044)
    • Reads the date of Windows installation

      • a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710.exe (PID: 3044)
    • Reads security settings of Internet Explorer

      • a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710.exe (PID: 3044)
    • Starts itself from another location

      • a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710.exe (PID: 3044)
    • Creates file in the systems drive root

      • drpbx.exe (PID: 7804)
  • INFO

    • Manual execution by a user

      • a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710.exe (PID: 3044)
    • Checks supported languages

      • a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710.exe (PID: 3044)
      • drpbx.exe (PID: 7804)
    • Creates files or folders in the user directory

      • a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710.exe (PID: 3044)
      • drpbx.exe (PID: 7804)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3800)
    • Reads the computer name

      • a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710.exe (PID: 3044)
      • drpbx.exe (PID: 7804)
    • Process checks computer location settings

      • a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710.exe (PID: 3044)
    • Reads the machine GUID from the registry

      • drpbx.exe (PID: 7804)
    • Creates files in the program directory

      • drpbx.exe (PID: 7804)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Deflated
ZipModifyDate: 2016:04:15 21:25:36
ZipCRC: 0x1b40f04c
ZipCompressedSize: 358149
ZipUncompressedSize: 446464
ZipFileName: a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe slui.exe no specs a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710.exe drpbx.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1212C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3044"C:\Users\admin\Desktop\a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710.exe" C:\Users\admin\Desktop\a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Firefox
Exit code:
0
Version:
37.0.2.5583
Modules
Images
c:\users\admin\desktop\a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3800"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\jogsaw.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7804"C:\Users\admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\admin\Desktop\a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710.exeC:\Users\admin\AppData\Local\Drpbx\drpbx.exe
a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710.exe
User:
admin
Integrity Level:
HIGH
Description:
Firefox
Version:
37.0.2.5583
Modules
Images
c:\users\admin\appdata\local\drpbx\drpbx.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
8168C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
90 225
Read events
90 207
Write events
18
Delete events
0

Modification events

(PID) Process:(3800) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3800) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3800) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(3800) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\jogsaw.zip
(PID) Process:(3800) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3800) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3800) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3800) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3800) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(3044) a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:firefox.exe
Value:
C:\Users\admin\AppData\Roaming\Frfx\firefox.exe
Executable files
3
Suspicious files
2 689
Text files
2
Unknown types
3

Dropped files

PID
Process
Filename
Type
7804drpbx.exeC:\Program Files\Microsoft Office\AppXManifest.xml.gws
MD5:
SHA256:
7804drpbx.exeC:\$WinREAgent\Rollback.xml.gwsbinary
MD5:ED10A0F1CA488C29622B8644CF424296
SHA256:C151CC994CD08A3AE59E706F7B281604F96436A9DC362EFE51BD9A5290F00D5D
3800WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb3800.1457\a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710executable
MD5:3BEE1D24189D4941F68B96DA6E207BE4
SHA256:A375201F22B6E71D8EA0F81266242E4638E1754AEEE14059E9C5E39026D6C710
7804drpbx.exeC:\Program Files\CUAssistant\LaptopPlugInToastImg.gif.gwsbinary
MD5:83A10E44A7AC18F1611A8F8B9326940A
SHA256:18D77BE09BD0CAC1245D6EB96D453E13BE9317649DC129ED797E5F632608CF4E
7804drpbx.exeC:\Program Files\CUAssistant\OkDone_80.png.gwsbinary
MD5:9562B9FA89FED34B89B60473E576A09A
SHA256:A2C1B66FCC2D2C769498F2B65944FF8BB4EF0E31DA4E0428E125BF4AD7161430
7804drpbx.exeC:\Program Files\CUAssistant\CUAssistantTask.xml.gwsbinary
MD5:3AA67AC954B6F979E793571B56B7BAF5
SHA256:D8518D74E8C269FD530B99885616EDDD920C73FB8A5DD63A2E2B670140453556
7804drpbx.exeC:\bootTel.dat.gwsbinary
MD5:6EAD661FD0FE0E21FF785593FE079460
SHA256:DFE99F06AA31562F0C3ACA588DBD45B23DC5C95C6FA94EA2D44062C7BE3DF9CD
3044a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710.exeC:\Users\admin\AppData\Local\Drpbx\drpbx.exeexecutable
MD5:3BEE1D24189D4941F68B96DA6E207BE4
SHA256:A375201F22B6E71D8EA0F81266242E4638E1754AEEE14059E9C5E39026D6C710
7804drpbx.exeC:\Recovery\ReAgentOld.xml.gwsbinary
MD5:A9A75A427E70BDB97BCF3418041F33C6
SHA256:E935CCFE3BFBEC09697E6B7A5B0B0ABF7E92CA2CCE59ACB4D6A54D2BEC0C081E
3044a375201f22b6e71d8ea0f81266242e4638e1754aeee14059e9c5e39026d6c710.exeC:\Users\admin\AppData\Roaming\Frfx\firefox.exeexecutable
MD5:3BEE1D24189D4941F68B96DA6E207BE4
SHA256:A375201F22B6E71D8EA0F81266242E4638E1754AEEE14059E9C5E39026D6C710
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
35
DNS requests
20
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
7856
svchost.exe
4.209.33.156:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4032
svchost.exe
239.255.255.250:1900
whitelisted
4716
svchost.exe
40.126.32.133:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
5620
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2760
svchost.exe
40.113.110.67:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7856
svchost.exe
4.208.221.206:443
licensing.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4716
svchost.exe
40.126.32.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
5116
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
login.live.com
  • 40.126.32.133
  • 40.126.32.68
  • 20.190.160.17
  • 40.126.32.140
  • 40.126.32.138
  • 40.126.32.76
  • 20.190.160.20
  • 20.190.160.14
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
  • 52.137.106.217
whitelisted
google.com
  • 142.250.185.110
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
licensing.mp.microsoft.com
  • 4.208.221.206
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
www.bing.com
  • 2.23.209.162
  • 2.23.209.174
  • 2.23.209.179
  • 2.23.209.178
  • 2.23.209.176
  • 2.23.209.175
  • 2.23.209.160
  • 2.23.209.167
  • 2.23.209.168
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
fd.api.iris.microsoft.com
  • 20.31.169.57
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
No debug info