Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-05-2022 22:52
Static task
static1
Behavioral task
behavioral1
Sample
W71my1HtQm.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
W71my1HtQm.exe
Resource
win10v2004-20220414-en
General
-
Target
W71my1HtQm.exe
-
Size
499KB
-
MD5
339165f63aec8d7fd7798129d0fc68ad
-
SHA1
07f594333ca9db110bbee37a9643988f4cc22933
-
SHA256
0f0014669bc10a7d87472cafc05301c66516857607b920ddeb3039f4cb8f0a50
-
SHA512
5ef9dbe0f29397adf00f0c4ace8f90fd0aba9a0c2016cecff02f68bcef5781bc5dcd32c18d9b54cc8025581ec6494990dd472cdd36c394637799907e5cc55e3b
Malware Config
Signatures
-
Mespinoza Ransomware 2 TTPs
Also known as Pysa. Ransomware-as-a-servoce which first appeared in 2020.
-
Modifies extensions of user files 18 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
W71my1HtQm.exedescription ioc Process File opened for modification C:\Users\Admin\Pictures\ConnectProtect.tiff.pysa W71my1HtQm.exe File renamed C:\Users\Admin\Pictures\DebugRegister.raw => C:\Users\Admin\Pictures\DebugRegister.raw.pysa W71my1HtQm.exe File opened for modification C:\Users\Admin\Pictures\HideCopy.tif.pysa W71my1HtQm.exe File opened for modification C:\Users\Admin\Pictures\InstallEnable.tif.pysa W71my1HtQm.exe File renamed C:\Users\Admin\Pictures\ConnectProtect.tiff => C:\Users\Admin\Pictures\ConnectProtect.tiff.pysa W71my1HtQm.exe File renamed C:\Users\Admin\Pictures\ConvertAssert.crw => C:\Users\Admin\Pictures\ConvertAssert.crw.pysa W71my1HtQm.exe File renamed C:\Users\Admin\Pictures\InstallEnable.tif => C:\Users\Admin\Pictures\InstallEnable.tif.pysa W71my1HtQm.exe File opened for modification C:\Users\Admin\Pictures\MountResize.raw.pysa W71my1HtQm.exe File opened for modification C:\Users\Admin\Pictures\UndoRestart.raw.pysa W71my1HtQm.exe File opened for modification C:\Users\Admin\Pictures\DebugRegister.raw.pysa W71my1HtQm.exe File renamed C:\Users\Admin\Pictures\MountResize.raw => C:\Users\Admin\Pictures\MountResize.raw.pysa W71my1HtQm.exe File renamed C:\Users\Admin\Pictures\StopPublish.raw => C:\Users\Admin\Pictures\StopPublish.raw.pysa W71my1HtQm.exe File opened for modification C:\Users\Admin\Pictures\StopPublish.raw.pysa W71my1HtQm.exe File opened for modification C:\Users\Admin\Pictures\ConvertAssert.crw.pysa W71my1HtQm.exe File renamed C:\Users\Admin\Pictures\HideCopy.tif => C:\Users\Admin\Pictures\HideCopy.tif.pysa W71my1HtQm.exe File renamed C:\Users\Admin\Pictures\SyncSplit.raw => C:\Users\Admin\Pictures\SyncSplit.raw.pysa W71my1HtQm.exe File opened for modification C:\Users\Admin\Pictures\SyncSplit.raw.pysa W71my1HtQm.exe File renamed C:\Users\Admin\Pictures\UndoRestart.raw => C:\Users\Admin\Pictures\UndoRestart.raw.pysa W71my1HtQm.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
W71my1HtQm.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation W71my1HtQm.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
W71my1HtQm.exedescription ioc Process File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\deploy\messages_zh_TW.properties.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\omni.ja.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\eu-es\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\da-dk\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ui-strings.js.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\dark\icons_ie8.gif.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ca-es\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\HomeBanner_Light.pdf.pysa W71my1HtQm.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\lib\deployed\jdk15\windows-amd64\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\he\LC_MESSAGES\vlc.mo.pysa W71my1HtQm.exe File created C:\Program Files\VideoLAN\VLC\locale\it\Readme.README W71my1HtQm.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\en-US\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\THIRDPARTYLICENSEREADME-JAVAFX.txt.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\ja-JP\msaddsr.dll.mui.pysa W71my1HtQm.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Examples\Validator\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\feature.properties.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\rjmx.jar.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\hu-hu\ui-strings.js.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\es-ES\msaddsr.dll.mui.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\hr-hr\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files\7-Zip\7z.sfx.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-core-execution_ja.jar.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-util-enumerations_zh_CN.jar.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\ext\nashorn.jar.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ro-ro\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\id\LC_MESSAGES\vlc.mo.pysa W71my1HtQm.exe File created C:\Program Files\VideoLAN\VLC\locale\it\LC_MESSAGES\Readme.README W71my1HtQm.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\Readme.README W71my1HtQm.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\Readme.README W71my1HtQm.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\binary\Readme.README W71my1HtQm.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.commands.nl_ja_4.4.0.v20140623020002.jar.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-openide-util-enumerations_ja.jar.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\apple-touch-icon-114x114-precomposed.png.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\en-il\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\de-de\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\eu-es\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\msadcor.dll.mui.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-settings_zh_CN.jar.pysa W71my1HtQm.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\pl-pl\AppStore_icon.svg.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\win\CP1254.TXT.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\bin\setNetworkClientCP.bat.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\zh-cn\ui-strings.js.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\dummy\adobe-old-logo.jpg.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\license.html.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-modules-core-kit.jar.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\eu-es\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\hr-hr\ui-strings.js.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\de-de\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\pt-br\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\zh-tw\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\ReadMe.htm.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\zh-tw\ui-strings.js.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\images\example_icons.png.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\MinionPro-Bold.otf.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.browser.attach_5.5.0.165303.jar.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.common_3.6.200.v20130402-1505.jar.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\org-netbeans-api-progress.jar.pysa W71my1HtQm.exe -
Drops file in Windows directory 1 IoCs
Processes:
W71my1HtQm.exedescription ioc Process File created C:\Windows\Readme.README W71my1HtQm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
W71my1HtQm.exedescription pid Process procid_target PID 4772 wrote to memory of 3800 4772 W71my1HtQm.exe 90 PID 4772 wrote to memory of 3800 4772 W71my1HtQm.exe 90 PID 4772 wrote to memory of 3800 4772 W71my1HtQm.exe 90 -
System policy modification 1 TTPs 2 IoCs
Processes:
W71my1HtQm.exedescription ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticetext = 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 W71my1HtQm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticecaption = 50005900530041000000 W71my1HtQm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\W71my1HtQm.exe"C:\Users\Admin\AppData\Local\Temp\W71my1HtQm.exe"1⤵
- Modifies extensions of user files
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\update.bat" "2⤵PID:3800
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231B
MD5715e4d1f8655fb52a0126e5a7dae0655
SHA16ef4a6f09ee41b4e252ffb2e6d0468ee2baa7fa8
SHA25641b5704d96abe077590fbd89587d411447555435112688a2a21183e91e98f211
SHA512a3fd655d5eb3fe22bcdb6c47b6d2fc892e152c4e103468864220639e6a740d1906596a639019c5cbe70a4eab00d47a3fcf4d60a4213a4da912bc4cd207b091a7