Analysis
-
max time kernel
144s -
max time network
135s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
03-07-2021 05:47
Static task
static1
Behavioral task
behavioral1
Sample
revil.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
revil.exe
Resource
win10v20210408
General
-
Target
revil.exe
-
Size
890KB
-
MD5
561cffbaba71a6e8cc1cdceda990ead4
-
SHA1
5162f14d75e96edb914d1756349d6e11583db0b0
-
SHA256
d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e
-
SHA512
09149b9825db2c9e6d2ec6665abc64b0b7aaafaa47c921c5bf0062cd7bedd1fc64cf54646a098f45fc4b930f5fbecee586fe839950c9135f64ea722b00baa50e
Malware Config
Extracted
C:\csruj-readme.txt
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/66060A2A6152521E
http://decoder.re/66060A2A6152521E
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4832 MsMpEng.exe -
Modifies Windows Firewall 1 TTPs
-
Modifies extensions of user files 11 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\MoveOpen.raw => \??\c:\users\admin\pictures\MoveOpen.raw.csruj MsMpEng.exe File renamed C:\Users\Admin\Pictures\ResetCompress.png => \??\c:\users\admin\pictures\ResetCompress.png.csruj MsMpEng.exe File renamed C:\Users\Admin\Pictures\JoinPush.crw => \??\c:\users\admin\pictures\JoinPush.crw.csruj MsMpEng.exe File renamed C:\Users\Admin\Pictures\DisableRegister.tif => \??\c:\users\admin\pictures\DisableRegister.tif.csruj MsMpEng.exe File renamed C:\Users\Admin\Pictures\DismountFind.png => \??\c:\users\admin\pictures\DismountFind.png.csruj MsMpEng.exe File renamed C:\Users\Admin\Pictures\EnterCopy.crw => \??\c:\users\admin\pictures\EnterCopy.crw.csruj MsMpEng.exe File renamed C:\Users\Admin\Pictures\HideGrant.raw => \??\c:\users\admin\pictures\HideGrant.raw.csruj MsMpEng.exe File renamed C:\Users\Admin\Pictures\LimitPing.png => \??\c:\users\admin\pictures\LimitPing.png.csruj MsMpEng.exe File renamed C:\Users\Admin\Pictures\ResizeWrite.raw => \??\c:\users\admin\pictures\ResizeWrite.raw.csruj MsMpEng.exe File renamed C:\Users\Admin\Pictures\UseOut.tif => \??\c:\users\admin\pictures\UseOut.tif.csruj MsMpEng.exe File renamed C:\Users\Admin\Pictures\CheckpointClear.png => \??\c:\users\admin\pictures\CheckpointClear.png.csruj MsMpEng.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: MsMpEng.exe File opened (read-only) \??\B: MsMpEng.exe File opened (read-only) \??\T: MsMpEng.exe File opened (read-only) \??\U: MsMpEng.exe File opened (read-only) \??\W: MsMpEng.exe File opened (read-only) \??\X: MsMpEng.exe File opened (read-only) \??\F: MsMpEng.exe File opened (read-only) \??\J: MsMpEng.exe File opened (read-only) \??\P: MsMpEng.exe File opened (read-only) \??\R: MsMpEng.exe File opened (read-only) \??\S: MsMpEng.exe File opened (read-only) \??\V: MsMpEng.exe File opened (read-only) \??\D: MsMpEng.exe File opened (read-only) \??\E: MsMpEng.exe File opened (read-only) \??\G: MsMpEng.exe File opened (read-only) \??\I: MsMpEng.exe File opened (read-only) \??\K: MsMpEng.exe File opened (read-only) \??\L: MsMpEng.exe File opened (read-only) \??\N: MsMpEng.exe File opened (read-only) \??\Q: MsMpEng.exe File opened (read-only) \??\Y: MsMpEng.exe File opened (read-only) \??\Z: MsMpEng.exe File opened (read-only) \??\H: MsMpEng.exe File opened (read-only) \??\M: MsMpEng.exe File opened (read-only) \??\O: MsMpEng.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ne5645p90n.bmp" MsMpEng.exe -
Drops file in Program Files directory 25 IoCs
description ioc Process File opened for modification \??\c:\program files\SelectUninstall.dib MsMpEng.exe File opened for modification \??\c:\program files\CloseDisable.pcx MsMpEng.exe File opened for modification \??\c:\program files\EnterAssert.htm MsMpEng.exe File opened for modification \??\c:\program files\HideSync.m1v MsMpEng.exe File opened for modification \??\c:\program files\InvokeRead.rtf MsMpEng.exe File opened for modification \??\c:\program files\MergeTest.jtx MsMpEng.exe File opened for modification \??\c:\program files\PopEnable.wma MsMpEng.exe File opened for modification \??\c:\program files\RestoreRemove.vstx MsMpEng.exe File opened for modification \??\c:\program files\ShowGrant.kix MsMpEng.exe File opened for modification \??\c:\program files\UninstallStart.tiff MsMpEng.exe File opened for modification \??\c:\program files\RedoUnprotect.clr MsMpEng.exe File opened for modification \??\c:\program files\RemoveOpen.temp MsMpEng.exe File opened for modification \??\c:\program files\SendAdd.rtf MsMpEng.exe File opened for modification \??\c:\program files\SendProtect.pub MsMpEng.exe File opened for modification \??\c:\program files\StopCompress.mht MsMpEng.exe File opened for modification \??\c:\program files\UninstallEdit.potm MsMpEng.exe File created \??\c:\program files\tmp MsMpEng.exe File created \??\c:\program files (x86)\tmp MsMpEng.exe File opened for modification \??\c:\program files\ConvertFromUndo.pptx MsMpEng.exe File opened for modification \??\c:\program files\ResolveAdd.wma MsMpEng.exe File opened for modification \??\c:\program files\SubmitJoin.aiff MsMpEng.exe File opened for modification \??\c:\program files\UnregisterSave.mp2 MsMpEng.exe File created \??\c:\program files\csruj-readme.txt MsMpEng.exe File created \??\c:\program files (x86)\csruj-readme.txt MsMpEng.exe File opened for modification \??\c:\program files\OptimizeGroup.mpg MsMpEng.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\MsMpEng.exe revil.exe File created C:\Windows\mpsvc.dll revil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4832 MsMpEng.exe 4832 MsMpEng.exe 4832 MsMpEng.exe 4832 MsMpEng.exe 4832 MsMpEng.exe 4832 MsMpEng.exe 4832 MsMpEng.exe 4832 MsMpEng.exe 4832 MsMpEng.exe 4832 MsMpEng.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4832 MsMpEng.exe Token: SeTakeOwnershipPrivilege 4832 MsMpEng.exe Token: SeBackupPrivilege 576 vssvc.exe Token: SeRestorePrivilege 576 vssvc.exe Token: SeAuditPrivilege 576 vssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4648 wrote to memory of 4832 4648 revil.exe 71 PID 4648 wrote to memory of 4832 4648 revil.exe 71 PID 4648 wrote to memory of 4832 4648 revil.exe 71 PID 4832 wrote to memory of 4272 4832 MsMpEng.exe 78 PID 4832 wrote to memory of 4272 4832 MsMpEng.exe 78 PID 4832 wrote to memory of 4272 4832 MsMpEng.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\revil.exe"C:\Users\Admin\AppData\Local\Temp\revil.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\MsMpEng.exe"C:\Windows\MsMpEng.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall set rule group="Network Discovery" new enable=Yes3⤵PID:4272
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:4048
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:576