Analysis
-
max time kernel
117s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-05-2022 22:49
Static task
static1
Behavioral task
behavioral1
Sample
W71my1HtQm.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
W71my1HtQm.exe
Resource
win10v2004-20220414-en
General
-
Target
W71my1HtQm.exe
-
Size
499KB
-
MD5
339165f63aec8d7fd7798129d0fc68ad
-
SHA1
07f594333ca9db110bbee37a9643988f4cc22933
-
SHA256
0f0014669bc10a7d87472cafc05301c66516857607b920ddeb3039f4cb8f0a50
-
SHA512
5ef9dbe0f29397adf00f0c4ace8f90fd0aba9a0c2016cecff02f68bcef5781bc5dcd32c18d9b54cc8025581ec6494990dd472cdd36c394637799907e5cc55e3b
Malware Config
Signatures
-
Mespinoza Ransomware 2 TTPs
Also known as Pysa. Ransomware-as-a-servoce which first appeared in 2020.
-
Modifies extensions of user files 20 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
W71my1HtQm.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\RemoveRegister.crw.pysa W71my1HtQm.exe File renamed C:\Users\Admin\Pictures\SetImport.raw => C:\Users\Admin\Pictures\SetImport.raw.pysa W71my1HtQm.exe File opened for modification C:\Users\Admin\Pictures\BackupFormat.tiff.pysa W71my1HtQm.exe File renamed C:\Users\Admin\Pictures\RegisterEnter.tif => C:\Users\Admin\Pictures\RegisterEnter.tif.pysa W71my1HtQm.exe File renamed C:\Users\Admin\Pictures\SelectFormat.tif => C:\Users\Admin\Pictures\SelectFormat.tif.pysa W71my1HtQm.exe File renamed C:\Users\Admin\Pictures\DisconnectUninstall.png => C:\Users\Admin\Pictures\DisconnectUninstall.png.pysa W71my1HtQm.exe File opened for modification C:\Users\Admin\Pictures\ExportCompare.tiff.pysa W71my1HtQm.exe File renamed C:\Users\Admin\Pictures\RemoveRegister.crw => C:\Users\Admin\Pictures\RemoveRegister.crw.pysa W71my1HtQm.exe File opened for modification C:\Users\Admin\Pictures\SelectFormat.tif.pysa W71my1HtQm.exe File opened for modification C:\Users\Admin\Pictures\SetImport.raw.pysa W71my1HtQm.exe File renamed C:\Users\Admin\Pictures\UnpublishSet.tiff => C:\Users\Admin\Pictures\UnpublishSet.tiff.pysa W71my1HtQm.exe File opened for modification C:\Users\Admin\Pictures\UnpublishSet.tiff.pysa W71my1HtQm.exe File renamed C:\Users\Admin\Pictures\UnregisterLock.crw => C:\Users\Admin\Pictures\UnregisterLock.crw.pysa W71my1HtQm.exe File renamed C:\Users\Admin\Pictures\ExportCompare.tiff => C:\Users\Admin\Pictures\ExportCompare.tiff.pysa W71my1HtQm.exe File opened for modification C:\Users\Admin\Pictures\RegisterEnter.tif.pysa W71my1HtQm.exe File renamed C:\Users\Admin\Pictures\UsePing.tiff => C:\Users\Admin\Pictures\UsePing.tiff.pysa W71my1HtQm.exe File opened for modification C:\Users\Admin\Pictures\UsePing.tiff.pysa W71my1HtQm.exe File opened for modification C:\Users\Admin\Pictures\UnregisterLock.crw.pysa W71my1HtQm.exe File renamed C:\Users\Admin\Pictures\BackupFormat.tiff => C:\Users\Admin\Pictures\BackupFormat.tiff.pysa W71my1HtQm.exe File opened for modification C:\Users\Admin\Pictures\DisconnectUninstall.png.pysa W71my1HtQm.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
W71my1HtQm.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation W71my1HtQm.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
W71my1HtQm.exedescription ioc process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\themes\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\config.js.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\msader15.dll.mui.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\lib\derbynet.jar.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\psfont.properties.ja.pysa W71my1HtQm.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\it-IT\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\MakeAccessible.api.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\export.svg.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-ae\ui-strings.js.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\illustrations.png.pysa W71my1HtQm.exe File created C:\Program Files\Common Files\microsoft shared\Triedit\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.p2.director_2.3.100.v20140224-1921.jar.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-utilities_zh_CN.jar.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\zh-cn\AppStore_icon.svg.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\da-dk\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\de-de\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\themes\dark\logo_retina.png.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\version.js.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\msadcer.dll.mui.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\security\local_policy.jar.pysa W71my1HtQm.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\LC_MESSAGES\vlc.mo.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\hi_contrast\aic_file_icons_hiContrast_bow.png.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ro-ro\ui-strings.js.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\pdf-ownership-rdr-ja_jp_2x.gif.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\sl_get.svg.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler_zh_CN.jar.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\modules\org-netbeans-modules-profiler-oql.jar.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-sa_zh_CN.jar.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Spelling.api.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\fr-fr\ui-strings.js.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\en-gb\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\da-dk\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ca-es\ui-strings.js.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-applemenu_ja.jar.pysa W71my1HtQm.exe File created C:\Program Files\VideoLAN\VLC\locale\tet\LC_MESSAGES\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\root\ui-strings.js.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\sv-se\ui-strings.js.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\improved-office-to-pdf.png.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\de-DE\msdaorar.dll.mui.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\THIRDPARTYLICENSEREADME.txt.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\META-INF\ECLIPSE_.SF.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.update.configurator_3.3.300.v20140518-1928.jar.pysa W71my1HtQm.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\liveleak.luac.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\pl-pl\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\es-es\ui-strings.js.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.net.win32.x86_64.nl_ja_4.4.0.v20140623020002.jar.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-api-progress_zh_CN.jar.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-options-keymap_zh_CN.jar.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-print.jar.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\rename.svg.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Download_on_the_App_Store_Badge_pl_135x40.svg.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\cmm\CIEXYZ.pf.pysa W71my1HtQm.exe File created C:\Program Files\WindowsApps\MovedPackages\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\pt-br\ui-strings.js.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\cs-cz\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\da-dk\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\it-IT\msader15.dll.mui.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.css.core_0.10.100.v20140424-2042.jar.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-lib-uihandler_ja.jar.pysa W71my1HtQm.exe File created C:\Program Files\VideoLAN\VLC\lua\http\Readme.README W71my1HtQm.exe -
Drops file in Windows directory 1 IoCs
Processes:
W71my1HtQm.exedescription ioc process File created C:\Windows\Readme.README W71my1HtQm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
W71my1HtQm.exedescription pid process target process PID 4832 wrote to memory of 2368 4832 W71my1HtQm.exe cmd.exe PID 4832 wrote to memory of 2368 4832 W71my1HtQm.exe cmd.exe PID 4832 wrote to memory of 2368 4832 W71my1HtQm.exe cmd.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
W71my1HtQm.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticetext = 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 W71my1HtQm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticecaption = 50005900530041000000 W71my1HtQm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\W71my1HtQm.exe"C:\Users\Admin\AppData\Local\Temp\W71my1HtQm.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\update.bat" "2⤵PID:2368
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231B
MD5715e4d1f8655fb52a0126e5a7dae0655
SHA16ef4a6f09ee41b4e252ffb2e6d0468ee2baa7fa8
SHA25641b5704d96abe077590fbd89587d411447555435112688a2a21183e91e98f211
SHA512a3fd655d5eb3fe22bcdb6c47b6d2fc892e152c4e103468864220639e6a740d1906596a639019c5cbe70a4eab00d47a3fcf4d60a4213a4da912bc4cd207b091a7