2051
Home Malware Detailed Technical Analysis of Jigsaw Ransomware Attack
Detailed Technical Analysis of Jigsaw Ransomware Attack Detailed Technical Analysis of Jigsaw Ransomware Attack
Malware,Ransomware | 06/08/2018

Detailed Technical Analysis of Jigsaw Ransomware Attack


In this technical analysis of the Jigsaw Ransomware attack, our (HTRI TEAM) security experts review the details of the ransomware campaign and steps to take to protect against such Jigsaw ransomware attacks

Jigsaw Ransomware Overview

Jigsaw is a part of the ransomware family. This is a new variant of Jigsaw ransomware, recently found by the security researcher. It encrypts the victim machine by using AES encryption method.

This ransomware targets only 15 File extensions.

It appends the filename of the affected file by adding .fun in the last. As per the ransom note, this ransomware will delete some files in every hour if the user didn’t pay the ransom amount on time.

This ransomware demands 100$ in bitcoins at following bitcoin address: 1Hd3tU8MDmuVotMgGJTJ7svzvPey6bfUgm

Flowchart

Flow Chart

Get peace of mind! Get rid of malicious programs instantly

Free Malware Scan Compatible with Win 10,8.1,8 & 7

Technical Analysis of Jigsaw Ransomware

File Name: Jigsaw.exe

MD5: 07046473F9BC851178EBC155D0BB916B

File Type: .EXE

 

Detail Description of Jigsaw Ransomware with Screenshots

As shown below, this ransomware has a minimum requirement of dot net framework 4.0

Dot Net Framework

Figure 1 Assembly Information

On execution of this ransomware it first gets & set the %appdata% path & copy itself into at following location:

%AppData$\Roaming\Frfx\firefox.exe

AppData\Local\Drpbx\drpbx.exe

 

Thereafter, it creates the Autorun entry in the registry so, that at each boot time it gets self-started. 

HKCU\Software\Microsoft\Windows\CurrentVersion\Run          firefox.exe=C:\Users\admin.admin-PC\AppData\Roaming\Frfx\firefox.exe         

 

Configuration Information

Figure 2 Configuration Information

 

As per the above configuration code, this ransomware generates the fake error message of Dot Net Framework 4.5.1 Requirement.

Fake Error Message

Figure 3 Fake Dot Net Requirement

This ransomware targets only 15 file extensions:

 .jpg .jpeg .gif .png .bmp .txt .doc .docx .pdf .xls .xlsx .csv .rar .zip .7zip

This ransomware appends the affected filename by adding .fun in the last & shows the ransom screen that contains the Welcome Message with Countdown Time & Input Fields.

Jigsaw Ransom Note

Figure 4 Ransom Message Screen

The victim can also see the list of encrypted files by pressing the button (“View Encrypted Files”)

Encrypted Files List

Figure 5 Encrypted Files List

The victim can easily restore the files by going back to the old restore point because this ransomware doesn’t delete any Volume Shadow Copies.

Every time this ransomware creates the different decryption key & then it try to connect their C&C (Command & Control) server to check whether the payment has been done or not.

As per the ransom note victim has demanded 100$ in the form of bitcoins at following bitcoin address:

1Hd3tU8MDmuVotMgGJTJ7svzvPey6bfUgm

 

IOC’s

Associated File Names & Hashes:

File Name

Hash

Sample.exe

07046473F9BC851178EBC155D0BB916B

Associated URL’s:

http://demourl.co.nf/pwd/write.php?info=PC-admin%20cEpFtlMNwZUsZLNuGPQTiT==

Associated File Paths:

%AppData$\Roaming\Frfx\firefox.exe

AppData\Local\Drpbx\drpbx.exe

 

Associated Registry:

HKCU\Software\Microsoft\Windows\CurrentVersion\Run          firefox.exe=C:\Users\admin.admin-PC\AppData\Roaming\Frfx\firefox.exe         

Associated Bitcoin Address:

1Hd3tU8MDmuVotMgGJTJ7svzvPey6bfUgm


Tips to Prevent virus and malware from Infecting Your System:
  1. Enable your popup blocker: Pop-ups and ads on the websites are the most adoptable tactic used by cybercriminals or developers with the core intention to spread malicious programs.
    So, avoid clicking uncertain sites, software offers, pop-ups etc. and Install a powerful ad- blocker for ChromeMozilla, and IE
  2. Keep your Windows Updated: To avoid such infections, we recommend that you should always keep your system updated through automatic windows update.By doing this you can keep your device free from virus.According to the survey, outdated/older versions of Windows operating system are an easy target.
  3. Third-party installation: Try to avoid freeware download websites as they usually install bundled of software with any installer or stub file.
  4. Regular Backup: Regular and periodical backup helps you to keep your data safe in case the system is infected by any kind of virus or any other infection.Thus always backup important files regularly on a cloud drive or an external hard drive.
  5. Always have an Anti-Virus: Precaution is better than cure. We recommend that you install an antivirus like ITL Total Security or a good Malware Removal Tool like Download Virus RemovalTool

Newsletter

×
×
#include file="../statichtml/static_notification.html"

1

ITLSecureVPN_setup.exe
2

3

1

2

3

1

2

3