File name:

HASH.zip

Full analysis: https://app.any.run/tasks/6d5ed7a8-5a2e-4950-b06f-e86468d37c78
Verdict: Malicious activity
Threats:

The Jigsaw ransomware, initially detected in 2016, encrypts files on compromised systems and requires a ransom payment in Bitcoin. If the ransom is not paid, the malware starts deleting files, increasing the pressure on victims to comply. Its source code is publicly accessible, allowing various threat actors to customize and repurpose the malware for different objectives.

Analysis date: December 14, 2024, 11:28:28
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
jigsaw
ransomware
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

B877491211BFCFF842912FD055588799

SHA1:

D19E7A79B08BAE01B00AC447F6CFD236EF055474

SHA256:

6D230F1F3A10F78741545A9D6FBD43BBB0A6A55FEFCA245760D5DB92AC3CC1CD

SSDEEP:

6144:zY4/Ezz+ML2q7kvNcezVavJdZP/B8ccT:z2XAGmNpdccT

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 6252)
    • Changes the autorun value in the registry

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
    • JIGSAW has been detected

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
    • RANSOMWARE has been detected

      • drpbx.exe (PID: 2728)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
    • Reads security settings of Internet Explorer

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
    • Starts itself from another location

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
    • Reads the date of Windows installation

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
    • Creates file in the systems drive root

      • drpbx.exe (PID: 2728)
  • INFO

    • The process uses the downloaded file

      • WinRAR.exe (PID: 6252)
      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
    • Creates files or folders in the user directory

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6252)
    • Manual execution by a user

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
    • Reads the computer name

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
      • drpbx.exe (PID: 2728)
    • Checks supported languages

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
      • drpbx.exe (PID: 2728)
    • Process checks computer location settings

      • 2773e3dc59472296cb0024ba7715a64e.exe (PID: 4544)
    • Creates files in the program directory

      • drpbx.exe (PID: 2728)
    • Reads the machine GUID from the registry

      • drpbx.exe (PID: 2728)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 788
ZipBitFlag: 0x0001
ZipCompression: Deflated
ZipModifyDate: 2016:04:13 18:02:34
ZipCRC: 0x3c351d58
ZipCompressedSize: 242871
ZipUncompressedSize: 290304
ZipFileName: 2773e3dc59472296cb0024ba7715a64e.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe #JIGSAW 2773e3dc59472296cb0024ba7715a64e.exe THREAT drpbx.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2728"C:\Users\admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\admin\Desktop\2773e3dc59472296cb0024ba7715a64e.exeC:\Users\admin\AppData\Local\Drpbx\drpbx.exe
2773e3dc59472296cb0024ba7715a64e.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Firefox
Version:
37.0.2.5583
Modules
Images
c:\users\admin\appdata\local\drpbx\drpbx.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
4544"C:\Users\admin\Desktop\2773e3dc59472296cb0024ba7715a64e.exe" C:\Users\admin\Desktop\2773e3dc59472296cb0024ba7715a64e.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
37.0.2.5583
Modules
Images
c:\users\admin\desktop\2773e3dc59472296cb0024ba7715a64e.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6252"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\HASH.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
5 417
Read events
5 381
Write events
23
Delete events
13

Modification events

(PID) Process:(6252) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6252) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6252) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6252) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\HASH.zip
(PID) Process:(6252) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6252) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6252) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6252) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6252) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(6252) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
3
Suspicious files
28
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
2728drpbx.exeC:\ProgramData\Microsoft\User Account Pictures\admin.dat.funtext
MD5:8EBCC5CA5AC09A09376801ECDD6F3792
SHA256:619E246FC0AC11320FF9E322A979948D949494B0C18217F4D794E1B398818880
2728drpbx.exeC:\Users\admin\Desktop\ledmaps.jpg.funbinary
MD5:E058C04D1298FDD31970E1671C2484D2
SHA256:A1C69B235B605376DFC7E116C31C8352715A476BB63BF92710CBC5677F1DADC5
2728drpbx.exeC:\Users\admin\Desktop\typecommittee.png.funbinary
MD5:A8F447B27EB5028609CFCE1231D169F0
SHA256:857E66686715DA2C85711C37D0E60898DD1FD3886463BE37101E3FE77B0F8189
2728drpbx.exeC:\Users\admin\Desktop\maonce.png.funbinary
MD5:F1D75779A0707272A811B13F21385732
SHA256:4BDA6C84A8B137BC6F9A294D15E5FFBDC57B4D6D17DBC5B8F05A64CDC33C204D
2728drpbx.exeC:\Users\admin\Desktop\rangemon.jpg.funbinary
MD5:A9A47F0506ADDB00846B4368F15D1EA8
SHA256:EA6DA4FC9DF1A8552F265FDF5A8F88019617F476E9BA45CA2EA8AB3903410BE7
2728drpbx.exeC:\Users\admin\Documents\bothcorrect.rtf.funbinary
MD5:3483B2190A692BAAD866393702AFDBB2
SHA256:B1AF8F212CA3A6A3288C15E849A37181E7298F5CBFEF8131970C286E9BEFB6D1
2728drpbx.exeC:\Users\admin\Documents\makespussy.rtf.funbinary
MD5:C0E58E2C31EE067F47C60AD4C641159B
SHA256:5038E44F70984BDB03D0430A8AAF6D3734F4EB544C7862D50EDEE721B66026EE
2728drpbx.exeC:\Users\admin\Desktop\laterlocations.jpg.funbinary
MD5:FBC543F85FDAE675F3114C0F23005909
SHA256:78D4251362A9FB6D83C6B7CDBA64371C02EFA07D6973D2C5021A39D3BC2770B8
2728drpbx.exeC:\Users\admin\Desktop\vaare.rtf.funbinary
MD5:8B0CC3624607A6979D68FC9652AB708D
SHA256:9D5D6A03EE203EE4547C1D2E942AED6571849A4C9995E85E9D359B31F4461162
2728drpbx.exeC:\Users\admin\Documents\whohit.rtf.funbinary
MD5:066D9867A2A6F3B6BEE9DED9926AA464
SHA256:ED859277E770E72CDE4C3C6A5068D30FF79DBD5A923ED6BDB422A1F23E84EE66
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
32
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6480
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6480
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
448
SIHClient.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
448
SIHClient.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3220
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2.19.217.218:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
5064
SearchApp.exe
23.212.110.147:443
www.bing.com
Akamai International B.V.
CZ
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
20.190.159.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 2.19.217.218
whitelisted
www.bing.com
  • 23.212.110.147
  • 23.212.110.153
  • 23.212.110.211
  • 23.212.110.136
  • 23.212.110.219
  • 23.212.110.144
  • 23.212.110.217
  • 23.212.110.208
  • 23.212.110.209
whitelisted
google.com
  • 142.250.185.110
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.2
  • 40.126.31.71
  • 40.126.31.69
  • 20.190.159.0
  • 20.190.159.4
  • 20.190.159.71
  • 20.190.159.73
  • 20.190.159.68
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
arc.msn.com
  • 20.74.47.205
whitelisted
fd.api.iris.microsoft.com
  • 20.223.36.55
whitelisted

Threats

No threats detected
No debug info