Analysis

  • max time kernel
    90s
  • max time network
    90s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    13-01-2022 17:53

General

  • Target

    scvhost.exe

  • Size

    500KB

  • MD5

    e04becb4c8ff826e5e5aa305dee074bc

  • SHA1

    07bf49663c9c76e4a468a98f2fe3a55977432a39

  • SHA256

    5fa8c4ab6dc45672099078277903cce8e86ae1e310f24a0dd9862166e3c0e30c

  • SHA512

    cb4c086df9395d1ebc68cc576d241e584c454e45db5365ed2196f0529cb6c2cad70b0f061e7fced4d980f10aabf8829f6e69602be8e086f73d9c1aa7d4d48fa2

Malware Config

Signatures

  • Mespinoza Ransomware 2 TTPs

    Also known as Pysa. Ransomware-as-a-servoce which first appeared in 2020.

  • Modifies extensions of user files 18 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 7 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\scvhost.exe
    "C:\Users\Admin\AppData\Local\Temp\scvhost.exe"
    1⤵
    • Modifies extensions of user files
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1624
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\update.bat" "
      2⤵
      • Deletes itself
      PID:1688
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1280
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:1000

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      1
      T1005

      Impact

      Data Encrypted for Impact

      1
      T1486

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\update.bat
        MD5

        8b62af0dab0aede04ce53ce7022fcf1c

        SHA1

        0f5f1d427531c502d8c46348cf5d52fe9d5e6bad

        SHA256

        f1202f4d1dd1b0d974eed9c7ebe97552522208c860dede4251b6b001f66143d8

        SHA512

        1884c41110456211f7cb163483bff6128700d9a8164354cf386abd3eaada7aa45e1112fd87adebb75375793a12e7c7785446f2326bf2c54bb6d81050a8f38451

      • memory/1280-55-0x000007FEFB5B1000-0x000007FEFB5B3000-memory.dmp
        Filesize

        8KB

      • memory/1624-54-0x0000000075AB1000-0x0000000075AB3000-memory.dmp
        Filesize

        8KB

      • memory/1688-56-0x0000000000000000-mapping.dmp