Overview
overview
10Static
static
10sample-604...ad.zip
windows7-x64
sample-604...ad.zip
windows7-x64
sample-604...ad.zip
windows10-2004-x64
sample-604...ad.zip
windows10-ltsc_2021-x64
sample-604...ad.zip
windows11-21h2-x64
W71my1HtQm.exe
windows10-2004-x64
10W71my1HtQm.exe
windows7-x64
10W71my1HtQm.exe
windows10-2004-x64
10W71my1HtQm.exe
windows10-ltsc_2021-x64
10W71my1HtQm.exe
windows11-21h2-x64
10Resubmissions
25/03/2025, 14:35
250325-ryhp1a1mv4 1005/02/2025, 10:30
250205-mj94gstpgl 1005/02/2025, 10:30
250205-mjtfqssmgt 1025/05/2022, 22:49
220525-2rm19aefd9 10Analysis
-
max time kernel
105s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 14:35
Behavioral task
behavioral1
Sample
sample-604995-339165f63aec8d7fd7798129d0fc68ad.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
sample-604995-339165f63aec8d7fd7798129d0fc68ad.zip
Resource
win7-20241023-en
Behavioral task
behavioral3
Sample
sample-604995-339165f63aec8d7fd7798129d0fc68ad.zip
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
sample-604995-339165f63aec8d7fd7798129d0fc68ad.zip
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
sample-604995-339165f63aec8d7fd7798129d0fc68ad.zip
Resource
win11-20250314-en
Behavioral task
behavioral6
Sample
W71my1HtQm.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral7
Sample
W71my1HtQm.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
W71my1HtQm.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
W71my1HtQm.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
W71my1HtQm.exe
Resource
win11-20250314-en
General
-
Target
W71my1HtQm.exe
-
Size
499KB
-
MD5
339165f63aec8d7fd7798129d0fc68ad
-
SHA1
07f594333ca9db110bbee37a9643988f4cc22933
-
SHA256
0f0014669bc10a7d87472cafc05301c66516857607b920ddeb3039f4cb8f0a50
-
SHA512
5ef9dbe0f29397adf00f0c4ace8f90fd0aba9a0c2016cecff02f68bcef5781bc5dcd32c18d9b54cc8025581ec6494990dd472cdd36c394637799907e5cc55e3b
-
SSDEEP
12288:WLIv9fm79P+OeO+OeNhBBhhBBmBRW3aHhIBidMbDI8s9eJ:EIv9OxBRW3+hIIdE01e
Malware Config
Extracted
C:\87efddaf44110a3d80760c508da79ad7\Readme.README
Signatures
-
Mespinoza Ransomware 2 TTPs
Also known as Pysa. Ransomware-as-a-servoce which first appeared in 2020.
-
Mespinoza family
-
Renames multiple (3450) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3446877943-4095308722-756223633-1000\Control Panel\International\Geo\Nation W71my1HtQm.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\VC\Readme.README W71my1HtQm.exe File created C:\Program Files\Google\Chrome\Application\133.0.6943.60\Extensions\Readme.README W71my1HtQm.exe File created C:\Program Files\VideoLAN\VLC\lua\http\js\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\it-IT\PackageManagementDscUtilities.strings.psd1.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\en-gb\ui-strings.js.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\nb-no\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ro-ro\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\zh-cn\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\de-de\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\main.css.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\it-it\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account-select\css\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\example_icons2x.png.pysa W71my1HtQm.exe File created C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\Readme.README W71my1HtQm.exe File created C:\Program Files\VideoLAN\VLC\locale\am_ET\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\tr\LC_MESSAGES\vlc.mo.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\css\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\ru-ru\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\css\main.css.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Common Files\Oracle\Java\Readme.README W71my1HtQm.exe File created C:\Program Files\Common Files\microsoft shared\ink\sk-SK\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\sqloledb.rll.mui.pysa W71my1HtQm.exe File created C:\Program Files\VideoLAN\VLC\plugins\access_output\Readme.README W71my1HtQm.exe File created C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\en-gb\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\de-de\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\da-dk\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\bun.png.pysa W71my1HtQm.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\vlc.mo.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ko-kr\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\core_icons_retina.png.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\fi-fi\ui-strings.js.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\MinionPro-Bold.otf.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Common Files\Adobe\HelpCfg\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\css\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\en-gb\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\root\ui-strings.js.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\lcms.md.pysa W71my1HtQm.exe File created C:\Program Files\VideoLAN\VLC\locale\nb\LC_MESSAGES\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\progress-indeterminate.gif.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_invite_24.svg.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Common Files\Adobe\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Windows Portable Devices\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\freebxml.md.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\jfr\profile.jfc.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\cs-cz\ui-strings.js.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ja-jp\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\libs\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\images\themeless\web_documentcloud_logo.png.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\en-ae\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\fr-fr\ui-strings.js.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\deploy\ffjcext.zip.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\ru-ru\ui-strings.js.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\root\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\et_get.svg.pysa W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\hr-hr\ui-strings.js.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\ko-kr\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\dc_logo.png.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\zh-tw\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\themes\dark\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\s_checkbox_selected_18.svg.pysa W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\sl-si\Readme.README W71my1HtQm.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\fi-fi\Readme.README W71my1HtQm.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\SharedPerformance.man.pysa W71my1HtQm.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\relaxngcc.md.pysa W71my1HtQm.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Readme.README W71my1HtQm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language W71my1HtQm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4124 wrote to memory of 4060 4124 W71my1HtQm.exe 103 PID 4124 wrote to memory of 4060 4124 W71my1HtQm.exe 103 PID 4124 wrote to memory of 4060 4124 W71my1HtQm.exe 103 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticecaption = 50005900530041000000 W71my1HtQm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticetext = 48006900200043006f006d00700061006e0079002c000d000a000d000a00450076006500720079002000620079007400650020006f006e00200061006e00790020007400790070006500730020006f006600200079006f0075007200200064006500760069006300650073002000770061007300200065006e0063007200790070007400650064002e000d000a0044006f006e00270074002000740072007900200074006f00200075007300650020006200610063006b007500700073002000620065006300610075007300650020006900740020007700650072006500200065006e006300720079007000740065006400200074006f006f002e000d000a000d000a0054006f002000670065007400200061006c006c00200079006f00750072002000640061007400610020006200610063006b00200063006f006e0074006100630074002000750073003a000d000a0053007400690076004400750067006c006100730073004000700072006f0074006f006e006d00610069006c002e0063006f006d000d000a004c0069006e00640061005300740072007500630068004000700072006f0074006f006e006d00610069006c002e0063006f006d000d000a002d002d002d002d002d002d002d002d002d002d002d002d002d002d000d000a000d000a004600410051003a000d000a000d000a0031002e000d000a0020002000200051003a00200048006f0077002000630061006e002000490020006d0061006b00650020007300750072006500200079006f007500200064006f006e0027007400200066006f006f006c0069006e00670020006d0065003f000d000a0020002000200041003a00200059006f0075002000630061006e002000730065006e006400200075007300200032002000660069006c006500730028006d0061007800200032006d00620029002e000d000a000d000a0032002e000d000a0020002000200051003a0020005700680061007400200074006f00200064006f00200074006f002000670065007400200061006c006c002000640061007400610020006200610063006b003f000d000a0020002000200041003a00200044006f006e0027007400200072006500730074006100720074002000740068006500200063006f006d00700075007400650072002c00200064006f006e002700740020006d006f00760065002000660069006c0065007300200061006e0064002000770072006900740065002000750073002e000d000a000d000a0033002e000d000a0020002000200051003a0020005700680061007400200074006f002000740065006c006c0020006d007900200062006f00730073003f000d000a0020002000200041003a002000500072006f007400650063007400200059006f00750072002000530079007300740065006d00200041006d00690067006f002e000d000a000d000a000000 W71my1HtQm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\W71my1HtQm.exeC:\Users\Admin\AppData\Local\Temp\W71my1HtQm.exe bcdedit /set shutdown /r /f /t 21⤵
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\update.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4060
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
528B
MD5b26277809ebf80bc297f7a3ce3cf0e03
SHA1e676b984e54a5a271645c0fc00070a85693d8199
SHA2569118268321ccd7872acda7d40b86d2856f329fa95b1cc6374f9deb7849b35ee1
SHA5123b23ba7677aff6540eb6e7a64f672036a647f7a7159dada81d135b5ae52489469456f813f310e617f7abb5d44bcf483220100a528ca9da8f93efae3d7d48860d
-
Filesize
231B
MD5715e4d1f8655fb52a0126e5a7dae0655
SHA16ef4a6f09ee41b4e252ffb2e6d0468ee2baa7fa8
SHA25641b5704d96abe077590fbd89587d411447555435112688a2a21183e91e98f211
SHA512a3fd655d5eb3fe22bcdb6c47b6d2fc892e152c4e103468864220639e6a740d1906596a639019c5cbe70a4eab00d47a3fcf4d60a4213a4da912bc4cd207b091a7