Summary(Jigsaw Ransomware Time table)
Jigsaw.exe - Process create(684)
[+]Copy File: Jigsaw.exe => C:\Users\Scott\AppData\Roming\Frfx\firefox.exe
[+]Copy File: Jigsaw.exe => C:\Users\Scott\AppData\Local\Drpbx\drpbx.exe
[+]Add Registery => HKU\S-1-5-21-3088076523-2200090595-96777359-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox.exe: "C:\Users\kimhy\AppData\Roaming\Frfx\firefox.exe"
+Drpbx.exe - Child Process Create(1584)
[-] Parents Process(684) terminate
[+] Encrypt files.
[+] Create File => C:\Users\kimhy\AppData\Roaming\System32Work\Address.txt
[+] Create File => C:\Users\kimhy\AppData\Roaming\System32Work\EncryptedFileList.txt
[+] Network Access(User Click Button) => 104.16.152.172:80
[+] Add Registy => HKLM\SOFTWARE\Microsoft\Tracing\drpbx_RASMANCS\EnableFileTracing: 0x00000000
[+] Add Registy => HKLM\SOFTWARE\Microsoft\Tracing\drpbx_RASMANCS\EnableConsoleTracing: 0x00000000
[+] Add Registy => HKLM\SOFTWARE\Microsoft\Tracing\drpbx_RASMANCS\FileTracingMask: 0xFFFF0000
[+] Add Registy => HKLM\SOFTWARE\Microsoft\Tracing\drpbx_RASMANCS\ConsoleTracingMask: 0xFFFF0000
[+] Add Registy => HKLM\SOFTWARE\Microsoft\Tracing\drpbx_RASMANCS\MaxFileSize: 0x00100000
[+] Add Registy => HKLM\SOFTWARE\Microsoft\Tracing\drpbx_RASMANCS\FileDirectory: "%windir%\tracing"
Symptoms of compromise
# 위와같은 메세지와 제한시간과 함께 돈을달라고 요구함.
# .fun file을 암호화함.
Analysis tool
1. sysmon
2. regshot
3. procmon
1. sysmon
UtcTime: 2018-02-13 15:44:40.989 SHA1=27D99FBCA067F478BB91CDBCB92F13A828B00859 |
UtcTime: 2018-02-13 15:44:41.441 ProcessId: 2576 ParentImage: C:\Users\kimhy\Desktop\malware\Ransomware.Jigsaw\jigsaw.exe ▶copy drpbx.exe |
Process terminated: ▶ drpbx.exe kill parents process |
Process terminated: |
2. Regshot
HKLM\SOFTWARE\Microsoft\Tracing\drpbx_RASMANCS\EnableFileTracing: 0x00000000 HKU\S-1-5-21-3088076523-2200090595-96777359-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox.exe: "C:\Users\kimhy\AppData\Roaming\Frfx\firefox.exe" |
3. Promon
# copy self to firefox.exe, drpbx.exe를 하는 것을 확인
# 파일들을 암호화는 것을 확인 원래 파일은 삭제한다. (옵션확인)
# Address.txt 파일 생성확인
# Encryption.txt 파일 생성확인(실제로 위의 경로에 들어가면 다음과 같이 파일이 존재한다.)
'Malware Analysis > - Ransomware Analysis' 카테고리의 다른 글
Satana Ransomware Analysis (0) | 2018.02.23 |
---|---|
Cerber Ransomware Analysis (0) | 2018.02.21 |
TeslaCrypt Ransomware analysis (0) | 2018.02.11 |