Analysis

  • max time kernel
    52s
  • max time network
    119s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    26-07-2021 12:59

General

  • Target

    48355bd2a57d92e017bdada911a4b31aa7225c0b12231c9cbda6717616abaea3.sample.exe

  • Size

    499KB

  • MD5

    4ff21b1cec174bbb5bf0b22e42a56af0

  • SHA1

    3c7ae5cfc9053284c73aa34819fd47fd7bc40cc7

  • SHA256

    48355bd2a57d92e017bdada911a4b31aa7225c0b12231c9cbda6717616abaea3

  • SHA512

    96a93838cedd0c9d847ca975ad7728e7bfa3662a29564ead784c2fbefc436a850aa2f9d218587a8130c1a08d5cf745ebd3b5c41afa8cda8f733086507f987c84

Malware Config

Signatures

  • Mespinoza Ransomware 2 TTPs

    Also known as Pysa. Ransomware-as-a-servoce which first appeared in 2020.

  • Modifies extensions of user files 16 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48355bd2a57d92e017bdada911a4b31aa7225c0b12231c9cbda6717616abaea3.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\48355bd2a57d92e017bdada911a4b31aa7225c0b12231c9cbda6717616abaea3.sample.exe"
    1⤵
    • Modifies extensions of user files
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3944
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\update.bat" "
      2⤵
        PID:3248

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads