Overview
overview
10Static
static
10sample-604...ad.zip
windows7-x64
sample-604...ad.zip
windows10-2004-x64
sample-604...ad.zip
android-13-x64
sample-604...ad.zip
android-13-x64
sample-604...ad.zip
macos-10.15-amd64
sample-604...ad.zip
ubuntu-18.04-amd64
sample-604...ad.zip
debian-9-armhf
sample-604...ad.zip
debian-9-mips
sample-604...ad.zip
debian-9-mipsel
W71my1HtQm.exe
windows7-x64
10W71my1HtQm.exe
windows10-2004-x64
10W71my1HtQm.exe
android-9-x86
W71my1HtQm.exe
android-13-x64
W71my1HtQm.exe
macos-10.15-amd64
W71my1HtQm.exe
ubuntu-18.04-amd64
W71my1HtQm.exe
debian-9-armhf
W71my1HtQm.exe
debian-9-mips
W71my1HtQm.exe
debian-9-mipsel
Resubmissions
05-02-2025 10:30
250205-mj94gstpgl 1005-02-2025 10:30
250205-mjtfqssmgt 1025-05-2022 22:49
220525-2rm19aefd9 10Analysis
-
max time kernel
140s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2025 10:30
Behavioral task
behavioral1
Sample
sample-604995-339165f63aec8d7fd7798129d0fc68ad.zip
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
sample-604995-339165f63aec8d7fd7798129d0fc68ad.zip
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
sample-604995-339165f63aec8d7fd7798129d0fc68ad.zip
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
sample-604995-339165f63aec8d7fd7798129d0fc68ad.zip
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral5
Sample
sample-604995-339165f63aec8d7fd7798129d0fc68ad.zip
Resource
macos-20241106-en
Behavioral task
behavioral6
Sample
sample-604995-339165f63aec8d7fd7798129d0fc68ad.zip
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral7
Sample
sample-604995-339165f63aec8d7fd7798129d0fc68ad.zip
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral8
Sample
sample-604995-339165f63aec8d7fd7798129d0fc68ad.zip
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral9
Sample
sample-604995-339165f63aec8d7fd7798129d0fc68ad.zip
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral10
Sample
W71my1HtQm.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
W71my1HtQm.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral12
Sample
W71my1HtQm.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral13
Sample
W71my1HtQm.exe
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral14
Sample
W71my1HtQm.exe
Resource
macos-20241101-en
Behavioral task
behavioral15
Sample
W71my1HtQm.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral16
Sample
W71my1HtQm.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral17
Sample
W71my1HtQm.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral18
Sample
W71my1HtQm.exe
Resource
debian9-mipsel-20240418-en
General
-
Target
W71my1HtQm.exe
-
Size
499KB
-
MD5
339165f63aec8d7fd7798129d0fc68ad
-
SHA1
07f594333ca9db110bbee37a9643988f4cc22933
-
SHA256
0f0014669bc10a7d87472cafc05301c66516857607b920ddeb3039f4cb8f0a50
-
SHA512
5ef9dbe0f29397adf00f0c4ace8f90fd0aba9a0c2016cecff02f68bcef5781bc5dcd32c18d9b54cc8025581ec6494990dd472cdd36c394637799907e5cc55e3b
-
SSDEEP
12288:WLIv9fm79P+OeO+OeNhBBhhBBmBRW3aHhIBidMbDI8s9eJ:EIv9OxBRW3+hIIdE01e
Malware Config
Extracted
C:\Users\Readme.README
Signatures
-
Mespinoza Ransomware 2 TTPs
Also known as Pysa. Ransomware-as-a-servoce which first appeared in 2020.
-
Mespinoza family
-
Renames multiple (3395) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation W71my1HtQm.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\es-es\ui-strings.js.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\da-dk\ui-strings.js.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\selector.js.pysa W71my1HtQm.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\de-DE\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\themes\dark\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\fr-fr\ui-strings.js.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\pl-pl\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_export_18.svg.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ui-strings.js.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Appstore\Download_on_the_App_Store_Badge_cs_135x40.svg.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\en-ae\ui-strings.js.pysa W71my1HtQm.exe File created C:\Program Files\VideoLAN\VLC\locale\af\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\meta\art\00_musicbrainz.luac.pysa W71my1HtQm.exe File created C:\Program Files\Windows Defender\fr-FR\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\hi_contrast\core_icons_highcontrast.png.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\cs-cz\ui-strings.js.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\pt-br\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\it-IT\sqlxmlx.rll.mui.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Google\Update\Download\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\currency.data.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\pl-pl\ui-strings.js.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\new_icons.png.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\eu-es\ui-strings.js.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ko-kr\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\zh-tw\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\pl-pl\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ko-kr\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ro-ro\ui-strings.js.pysa W71my1HtQm.exe File created C:\Program Files\Google\Chrome\Application\123.0.6312.123\MEIPreload\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\santuario.md.pysa W71my1HtQm.exe File created C:\Program Files\Java\jre-1.8\legal\Readme.README W71my1HtQm.exe File created C:\Program Files\Windows Media Player\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\css\main-selector.css.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ru-ru\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ca-es\ui-strings.js.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\fr-fr\Readme.README W71my1HtQm.exe File created C:\Program Files\Reference Assemblies\Readme.README W71my1HtQm.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Assertions\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ru-ru\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\zh-cn\ui-strings.js.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\selector.js.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\adobe_sign_tag_retina.png.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\pl-pl\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\MyriadPro-Regular.otf.pysa W71my1HtQm.exe File created C:\Program Files\Java\jdk-1.8\include\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\deploy\messages_ja.properties.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\fonts\LucidaTypewriterRegular.ttf.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\hr-hr\ui-strings.js.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\SaveAsRTF.api.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\fi-fi\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ko-kr\ui-strings.js.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\mr.pak.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk-1.8\lib\dt.jar.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\de-de\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\de-de\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Appstore\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\en-US\MSFT_PackageManagement.strings.psd1.pysa W71my1HtQm.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Examples\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\ca-es\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\themes\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\nl-nl\Readme.README W71my1HtQm.exe File created C:\Program Files\ModifiableWindowsApps\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\status.json.pysa W71my1HtQm.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Readme.README W71my1HtQm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language W71my1HtQm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 872 wrote to memory of 832 872 W71my1HtQm.exe 91 PID 872 wrote to memory of 832 872 W71my1HtQm.exe 91 PID 872 wrote to memory of 832 872 W71my1HtQm.exe 91 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticecaption = 50005900530041000000 W71my1HtQm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticetext = 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 W71my1HtQm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\W71my1HtQm.exeC:\Users\Admin\AppData\Local\Temp\W71my1HtQm.exe dsrm -subtree -noprompt -c user"http://+:443"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
- System policy modification
PID:872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\update.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:832
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231B
MD5715e4d1f8655fb52a0126e5a7dae0655
SHA16ef4a6f09ee41b4e252ffb2e6d0468ee2baa7fa8
SHA25641b5704d96abe077590fbd89587d411447555435112688a2a21183e91e98f211
SHA512a3fd655d5eb3fe22bcdb6c47b6d2fc892e152c4e103468864220639e6a740d1906596a639019c5cbe70a4eab00d47a3fcf4d60a4213a4da912bc4cd207b091a7
-
Filesize
528B
MD5b26277809ebf80bc297f7a3ce3cf0e03
SHA1e676b984e54a5a271645c0fc00070a85693d8199
SHA2569118268321ccd7872acda7d40b86d2856f329fa95b1cc6374f9deb7849b35ee1
SHA5123b23ba7677aff6540eb6e7a64f672036a647f7a7159dada81d135b5ae52489469456f813f310e617f7abb5d44bcf483220100a528ca9da8f93efae3d7d48860d