Analysis
-
max time kernel
144s -
max time network
135s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
03-07-2021 05:47
Static task
static1
Behavioral task
behavioral1
Sample
revil.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
revil.exe
Resource
win10v20210408
General
-
Target
revil.exe
-
Size
890KB
-
MD5
561cffbaba71a6e8cc1cdceda990ead4
-
SHA1
5162f14d75e96edb914d1756349d6e11583db0b0
-
SHA256
d55f983c994caa160ec63a59f6b4250fe67fb3e8c43a388aec60a4a6978e9f1e
-
SHA512
09149b9825db2c9e6d2ec6665abc64b0b7aaafaa47c921c5bf0062cd7bedd1fc64cf54646a098f45fc4b930f5fbecee586fe839950c9135f64ea722b00baa50e
Malware Config
Extracted
C:\csruj-readme.txt
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/66060A2A6152521E
http://decoder.re/66060A2A6152521E
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
MsMpEng.exepid Process 4832 MsMpEng.exe -
Modifies Windows Firewall 1 TTPs
-
Modifies extensions of user files 11 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
MsMpEng.exedescription ioc Process File renamed C:\Users\Admin\Pictures\MoveOpen.raw => \??\c:\users\admin\pictures\MoveOpen.raw.csruj MsMpEng.exe File renamed C:\Users\Admin\Pictures\ResetCompress.png => \??\c:\users\admin\pictures\ResetCompress.png.csruj MsMpEng.exe File renamed C:\Users\Admin\Pictures\JoinPush.crw => \??\c:\users\admin\pictures\JoinPush.crw.csruj MsMpEng.exe File renamed C:\Users\Admin\Pictures\DisableRegister.tif => \??\c:\users\admin\pictures\DisableRegister.tif.csruj MsMpEng.exe File renamed C:\Users\Admin\Pictures\DismountFind.png => \??\c:\users\admin\pictures\DismountFind.png.csruj MsMpEng.exe File renamed C:\Users\Admin\Pictures\EnterCopy.crw => \??\c:\users\admin\pictures\EnterCopy.crw.csruj MsMpEng.exe File renamed C:\Users\Admin\Pictures\HideGrant.raw => \??\c:\users\admin\pictures\HideGrant.raw.csruj MsMpEng.exe File renamed C:\Users\Admin\Pictures\LimitPing.png => \??\c:\users\admin\pictures\LimitPing.png.csruj MsMpEng.exe File renamed C:\Users\Admin\Pictures\ResizeWrite.raw => \??\c:\users\admin\pictures\ResizeWrite.raw.csruj MsMpEng.exe File renamed C:\Users\Admin\Pictures\UseOut.tif => \??\c:\users\admin\pictures\UseOut.tif.csruj MsMpEng.exe File renamed C:\Users\Admin\Pictures\CheckpointClear.png => \??\c:\users\admin\pictures\CheckpointClear.png.csruj MsMpEng.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
MsMpEng.exedescription ioc Process File opened (read-only) \??\A: MsMpEng.exe File opened (read-only) \??\B: MsMpEng.exe File opened (read-only) \??\T: MsMpEng.exe File opened (read-only) \??\U: MsMpEng.exe File opened (read-only) \??\W: MsMpEng.exe File opened (read-only) \??\X: MsMpEng.exe File opened (read-only) \??\F: MsMpEng.exe File opened (read-only) \??\J: MsMpEng.exe File opened (read-only) \??\P: MsMpEng.exe File opened (read-only) \??\R: MsMpEng.exe File opened (read-only) \??\S: MsMpEng.exe File opened (read-only) \??\V: MsMpEng.exe File opened (read-only) \??\D: MsMpEng.exe File opened (read-only) \??\E: MsMpEng.exe File opened (read-only) \??\G: MsMpEng.exe File opened (read-only) \??\I: MsMpEng.exe File opened (read-only) \??\K: MsMpEng.exe File opened (read-only) \??\L: MsMpEng.exe File opened (read-only) \??\N: MsMpEng.exe File opened (read-only) \??\Q: MsMpEng.exe File opened (read-only) \??\Y: MsMpEng.exe File opened (read-only) \??\Z: MsMpEng.exe File opened (read-only) \??\H: MsMpEng.exe File opened (read-only) \??\M: MsMpEng.exe File opened (read-only) \??\O: MsMpEng.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
MsMpEng.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ne5645p90n.bmp" MsMpEng.exe -
Drops file in Program Files directory 25 IoCs
Processes:
MsMpEng.exedescription ioc Process File opened for modification \??\c:\program files\SelectUninstall.dib MsMpEng.exe File opened for modification \??\c:\program files\CloseDisable.pcx MsMpEng.exe File opened for modification \??\c:\program files\EnterAssert.htm MsMpEng.exe File opened for modification \??\c:\program files\HideSync.m1v MsMpEng.exe File opened for modification \??\c:\program files\InvokeRead.rtf MsMpEng.exe File opened for modification \??\c:\program files\MergeTest.jtx MsMpEng.exe File opened for modification \??\c:\program files\PopEnable.wma MsMpEng.exe File opened for modification \??\c:\program files\RestoreRemove.vstx MsMpEng.exe File opened for modification \??\c:\program files\ShowGrant.kix MsMpEng.exe File opened for modification \??\c:\program files\UninstallStart.tiff MsMpEng.exe File opened for modification \??\c:\program files\RedoUnprotect.clr MsMpEng.exe File opened for modification \??\c:\program files\RemoveOpen.temp MsMpEng.exe File opened for modification \??\c:\program files\SendAdd.rtf MsMpEng.exe File opened for modification \??\c:\program files\SendProtect.pub MsMpEng.exe File opened for modification \??\c:\program files\StopCompress.mht MsMpEng.exe File opened for modification \??\c:\program files\UninstallEdit.potm MsMpEng.exe File created \??\c:\program files\tmp MsMpEng.exe File created \??\c:\program files (x86)\tmp MsMpEng.exe File opened for modification \??\c:\program files\ConvertFromUndo.pptx MsMpEng.exe File opened for modification \??\c:\program files\ResolveAdd.wma MsMpEng.exe File opened for modification \??\c:\program files\SubmitJoin.aiff MsMpEng.exe File opened for modification \??\c:\program files\UnregisterSave.mp2 MsMpEng.exe File created \??\c:\program files\csruj-readme.txt MsMpEng.exe File created \??\c:\program files (x86)\csruj-readme.txt MsMpEng.exe File opened for modification \??\c:\program files\OptimizeGroup.mpg MsMpEng.exe -
Drops file in Windows directory 2 IoCs
Processes:
revil.exedescription ioc Process File created C:\Windows\MsMpEng.exe revil.exe File created C:\Windows\mpsvc.dll revil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
MsMpEng.exepid Process 4832 MsMpEng.exe 4832 MsMpEng.exe 4832 MsMpEng.exe 4832 MsMpEng.exe 4832 MsMpEng.exe 4832 MsMpEng.exe 4832 MsMpEng.exe 4832 MsMpEng.exe 4832 MsMpEng.exe 4832 MsMpEng.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
MsMpEng.exevssvc.exedescription pid Process Token: SeDebugPrivilege 4832 MsMpEng.exe Token: SeTakeOwnershipPrivilege 4832 MsMpEng.exe Token: SeBackupPrivilege 576 vssvc.exe Token: SeRestorePrivilege 576 vssvc.exe Token: SeAuditPrivilege 576 vssvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
revil.exeMsMpEng.exedescription pid Process procid_target PID 4648 wrote to memory of 4832 4648 revil.exe 71 PID 4648 wrote to memory of 4832 4648 revil.exe 71 PID 4648 wrote to memory of 4832 4648 revil.exe 71 PID 4832 wrote to memory of 4272 4832 MsMpEng.exe 78 PID 4832 wrote to memory of 4272 4832 MsMpEng.exe 78 PID 4832 wrote to memory of 4272 4832 MsMpEng.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\revil.exe"C:\Users\Admin\AppData\Local\Temp\revil.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\MsMpEng.exe"C:\Windows\MsMpEng.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall set rule group="Network Discovery" new enable=Yes3⤵PID:4272
-
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:4048
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:576
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
8cc83221870dd07144e63df594c391d9
SHA13d409b39b8502fcd23335a878f2cbdaf6d721995
SHA25633bc14d231a4afaa18f06513766d5f69d8b88f1e697cd127d24fb4b72ad44c7a
SHA512e7f964a10a8799310a519fa569d264f652e13cc7ea199792dc6a5c0507dec4a12844a87bf8bab714255dce717839908ed5d967ce8f65f5520fe4e7f9d25a622c
-
MD5
8cc83221870dd07144e63df594c391d9
SHA13d409b39b8502fcd23335a878f2cbdaf6d721995
SHA25633bc14d231a4afaa18f06513766d5f69d8b88f1e697cd127d24fb4b72ad44c7a
SHA512e7f964a10a8799310a519fa569d264f652e13cc7ea199792dc6a5c0507dec4a12844a87bf8bab714255dce717839908ed5d967ce8f65f5520fe4e7f9d25a622c
-
MD5
a47cf00aedf769d60d58bfe00c0b5421
SHA1656c4d285ea518d90c1b669b79af475db31e30b1
SHA2568dd620d9aeb35960bb766458c8890ede987c33d239cf730f93fe49d90ae759dd
SHA5124c2dcad3bd478fa70d086b7426d55976caa7ffc3d120c9c805cbb49eae910123c496bf2356066afcacba12ba05c963bbb8d95ed7f548479c90fec57aa16e4637