File name:

Ransomware.Jigsaw.zip

Full analysis: https://app.any.run/tasks/e8104c8a-78b4-4349-80e5-9f6d828e872f
Verdict: Malicious activity
Analysis date: February 28, 2024, 20:37:03
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

3AD6374A3558149D09D74E6AF72344E3

SHA1:

E7BE9F22578027FC0B6DDB94C09B245EE8CE1620

SHA256:

86A391FE7A237F4F17846C53D71E45820411D1A9A6E0C16F22A11EBC491FF9FF

SSDEEP:

3072:p7ykj3uuY4NsJD7kPdSRQLqas/pkPm9jvkEL60Uf7k2BgS6/aFybrNN5ZAdNstk7:p7ym3VNA7w8R5/rxv7O0yng0UtVw5NJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • jigsaw.exe (PID: 4060)
      • WinRAR.exe (PID: 3240)
      • drpbx.exe (PID: 4008)
    • Changes the autorun value in the registry

      • jigsaw.exe (PID: 4060)
    • Actions looks like stealing of personal data

      • drpbx.exe (PID: 4008)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • jigsaw.exe (PID: 4060)
    • Reads security settings of Internet Explorer

      • jigsaw.exe (PID: 4060)
    • Reads the Internet Settings

      • jigsaw.exe (PID: 4060)
      • taskmgr.exe (PID: 2756)
    • Starts itself from another location

      • jigsaw.exe (PID: 4060)
    • Application launched itself

      • taskmgr.exe (PID: 2756)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3240)
    • Checks supported languages

      • jigsaw.exe (PID: 4060)
      • drpbx.exe (PID: 4008)
    • Manual execution by a user

      • jigsaw.exe (PID: 4060)
      • taskmgr.exe (PID: 2756)
      • rundll32.exe (PID: 2504)
    • Creates files or folders in the user directory

      • jigsaw.exe (PID: 4060)
      • drpbx.exe (PID: 4008)
    • Reads the computer name

      • jigsaw.exe (PID: 4060)
    • Reads the machine GUID from the registry

      • jigsaw.exe (PID: 4060)
      • drpbx.exe (PID: 4008)
    • Creates files in the program directory

      • drpbx.exe (PID: 4008)
    • Reads security settings of Internet Explorer

      • taskmgr.exe (PID: 2756)
    • Reads the time zone

      • perfmon.exe (PID: 1992)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Deflated
ZipModifyDate: 2016:04:13 19:02:34
ZipCRC: 0x3c351d58
ZipCompressedSize: 245469
ZipUncompressedSize: 290304
ZipFileName: jigsaw
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
56
Monitored processes
8
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe jigsaw.exe drpbx.exe taskmgr.exe no specs perfmon.exe rundll32.exe no specs taskmgr.exe taskmgr.exe

Process information

PID
CMD
Path
Indicators
Parent process
1232"C:\Windows\system32\taskmgr.exe" /1C:\Windows\System32\taskmgr.exe
taskmgr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Task Manager
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1596"C:\Windows\system32\taskmgr.exe" /1C:\Windows\System32\taskmgr.exe
taskmgr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Task Manager
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1992"C:\Windows\System32\perfmon.exe" /resC:\Windows\System32\perfmon.exe
taskmgr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Resource and Performance Monitor
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\perfmon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2504"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\Desktop\zealandreason.rtf.funC:\Windows\System32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
2756"C:\Windows\system32\taskmgr.exe" /4C:\Windows\System32\taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Task Manager
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3240"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Ransomware.Jigsaw.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
4008"C:\Users\admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\admin\AppData\Local\Temp\Ransomware.Jigsaw\jigsaw.exeC:\Users\admin\AppData\Local\Drpbx\drpbx.exe
jigsaw.exe
User:
admin
Integrity Level:
HIGH
Description:
Firefox
Exit code:
0
Version:
37.0.2.5583
Modules
Images
c:\users\admin\appdata\local\drpbx\drpbx.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
4060"C:\Users\admin\AppData\Local\Temp\Ransomware.Jigsaw\jigsaw.exe" C:\Users\admin\AppData\Local\Temp\Ransomware.Jigsaw\jigsaw.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Firefox
Exit code:
0
Version:
37.0.2.5583
Modules
Images
c:\users\admin\appdata\local\temp\ransomware.jigsaw\jigsaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
31 446
Read events
31 411
Write events
35
Delete events
0

Modification events

(PID) Process:(3240) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3240) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3240) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3240) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3240) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3240) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(3240) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Ransomware.Jigsaw.zip
(PID) Process:(3240) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3240) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3240) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
3
Suspicious files
697
Text files
3
Unknown types
1 035

Dropped files

PID
Process
Filename
Type
4008drpbx.exeC:\Program Files\Notepad++\contextMenu.xml.funbinary
MD5:BE71D95C47DFAD9533F15D52CF2566D5
SHA256:2501FE92DDBF8D2AE4B05D348504D090268C0E7397188856F38E4E72C5D4E918
4060jigsaw.exeC:\Users\admin\AppData\Roaming\Frfx\firefox.exeexecutable
MD5:2773E3DC59472296CB0024BA7715A64E
SHA256:3AE96F73D805E1D3995253DB4D910300D8442EA603737A1428B613061E7F61E7
4008drpbx.exeC:\Program Files\Notepad++\langs.model.xml.funbinary
MD5:7473961B073EB91F779284580A72B17E
SHA256:211A665FE918DD3F64691A45EDBF5B9E9E385740EFE73E815439E94513EB870B
4008drpbx.exeC:\Program Files\Notepad++\functionList.xml.funbinary
MD5:4D7EBB51BB66C55F8CF42DE2666FDC18
SHA256:135ACE48B150C2C363F048DEC81451D0798D25D8FB1C997B418F6B8114859AAC
4060jigsaw.exeC:\Users\admin\AppData\Local\Drpbx\drpbx.exeexecutable
MD5:2773E3DC59472296CB0024BA7715A64E
SHA256:3AE96F73D805E1D3995253DB4D910300D8442EA603737A1428B613061E7F61E7
4008drpbx.exeC:\Program Files\WinRAR\rarnew.dat.funbinary
MD5:2B4CCE4587D3D16C28BEF0B1C43FD63B
SHA256:5E47C760B0563379F444FFED52C1BF01C9F0A5901AF8E000861D209D8E3C8192
4008drpbx.exeC:\Program Files\WinRAR\Rar.txt.funbinary
MD5:DBAE821F781AFDDDB14129F3D8E2F4EB
SHA256:FEF9DB86FF8028454C99AD0D187504DCE818A48AE078496F3DA93620B4FFDFFB
4008drpbx.exeC:\Program Files\WinRAR\ReadMe.txt.funbinary
MD5:434EC2BCEA20CE0CDE426990402BB0B8
SHA256:C4495DEA13E766BF8BE13BFA0E8225DA72C5C17F7EACAA7EF4E42C6A62A418B8
4008drpbx.exeC:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\AccessMUI.xml.funbinary
MD5:B8E36A31142237D9E5C6A18056D448C1
SHA256:9E30A1A8685998EC8227FAA33A0FD0B2485FF430C4A3D4FC41CDAC6C33F33BE7
4008drpbx.exeC:\Program Files\WinRAR\zipnew.dat.funbinary
MD5:59E29ACC835D92FCAC450FDE64F31EE6
SHA256:C34B5B24470C398C15904250EB1B31387514CA7E4FFF896532269D9066CD0739
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
9
DNS requests
5
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.2:137
whitelisted

DNS requests

Domain
IP
Reputation
255.100.168.192.in-addr.arpa
unknown
252.0.0.224.in-addr.arpa
unknown
3.0.0.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.f.f.ip6.arpa
unknown
2.100.168.192.in-addr.arpa
unknown

Threats

No threats detected
No debug info