Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2023 03:51
Behavioral task
behavioral1
Sample
2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe
Resource
win10v2004-20230220-en
General
-
Target
2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe
-
Size
165KB
-
MD5
e4be3e7aa3e471f7c42ec7ba35c3d69f
-
SHA1
5640beca5831e8a49031cd335a31415bfc8f3282
-
SHA256
50fdb342de90ce63c31625156beb9ed968bf11527ce7c4c3bd4a3f3f7c4cf730
-
SHA512
11b7e7659b083d1a7a060c7512651089fab63960e96083a60123c44cdd957a022c7d0af8c7b1bb7db364c44d30333ec2e121a9f4a85659f61143c8f36504fc26
-
SSDEEP
3072:eCEq0R0nZ5ys5n4Y9doh7O79siUs/NaV4mKI3EeUO:lw02sJPi7O93NK4mKI0VO
Malware Config
Extracted
C:\Recovery\4e53o7o-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/7C41522F9169AEA0
http://decryptor.top/7C41522F9169AEA0
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exedescription ioc process File renamed C:\Users\Admin\Pictures\PopExport.png => \??\c:\users\admin\pictures\PopExport.png.4e53o7o 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File renamed C:\Users\Admin\Pictures\PopResize.crw => \??\c:\users\admin\pictures\PopResize.crw.4e53o7o 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File renamed C:\Users\Admin\Pictures\ResumeDisable.crw => \??\c:\users\admin\pictures\ResumeDisable.crw.4e53o7o 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File renamed C:\Users\Admin\Pictures\CloseSuspend.png => \??\c:\users\admin\pictures\CloseSuspend.png.4e53o7o 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exedescription ioc process File opened (read-only) \??\E: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\I: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\K: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\T: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\W: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\X: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\A: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\G: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\H: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\O: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\R: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\S: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\V: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\B: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\P: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\Q: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\U: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\N: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\J: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\L: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\M: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\Y: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\Z: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\D: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened (read-only) \??\F: 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nf13w6063.bmp" 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe -
Drops file in Program Files directory 35 IoCs
Processes:
2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exedescription ioc process File opened for modification \??\c:\program files\ExitDismount.js 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\SaveConvert.contact 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\RegisterPublish.001 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\ResetMerge.nfo 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\ShowLimit.css 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\ExportLimit.wma 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\LockInitialize.rtf 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\RegisterPop.tmp 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\JoinDeny.dwfx 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\JoinRemove.xlt 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\ProtectConfirm.zip 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File created \??\c:\program files (x86)\4e53o7o-readme.txt 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\CompressUnprotect.xps 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\InitializeSplit.M2TS 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File created \??\c:\program files\4e53o7o-readme.txt 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\SearchLimit.jpg 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\SendSplit.crw 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\DisconnectRedo.vsdm 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\RemoveEnter.wm 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\UnlockHide.vstx 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\AssertStop.aifc 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\ClearUnprotect.xht 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\ConfirmConvert.ods 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\EnableClear.wmf 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\GetConfirm.M2V 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\ReceiveStep.zip 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\ResetProtect.js 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\BlockEnter.docm 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\CloseCompare.ppt 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\CompareTrace.vsdx 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\TraceUnlock.wdp 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\UseRequest.emz 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\BlockPublish.dotx 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\CheckpointUpdate.kix 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe File opened for modification \??\c:\program files\InitializeLock.xml 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exepowershell.exepid process 3532 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe 3532 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe 2728 powershell.exe 2728 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 2728 powershell.exe Token: SeBackupPrivilege 4912 vssvc.exe Token: SeRestorePrivilege 4912 vssvc.exe Token: SeAuditPrivilege 4912 vssvc.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exedescription pid process target process PID 3532 wrote to memory of 2728 3532 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe powershell.exe PID 3532 wrote to memory of 2728 3532 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe powershell.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe"C:\Users\Admin\AppData\Local\Temp\2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:4664
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4912
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD579d8c8c6230fd6abb73d16dbc2ee6581
SHA1e127ba2c6c81158d3b5e9abfbdfe1096f2576e1e
SHA2560aaf3d8d7326b50ceb25f455a7446ec2df5023f08420a680eb5209efe457b210
SHA512bd3d624f7bb9cebf8702d4d59f2117056cc5a1c05f58eb8468e321ba9c71fe24d1cecff5c6a9df413e33dc44ae0436d5adb598ec2ad65fc06f9de5a60238c110
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82