Analysis Overview
SHA256
50fdb342de90ce63c31625156beb9ed968bf11527ce7c4c3bd4a3f3f7c4cf730
Threat Level: Known bad
The file 2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil was found to be: Known bad.
Malicious Activity Summary
Sodinokibi family
Sodin,Sodinokibi,REvil
Modifies extensions of user files
Enumerates connected drives
Sets desktop wallpaper using registry
Drops file in Program Files directory
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Uses Volume Shadow Copy service COM API
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2023-04-22 03:51
Signatures
Sodinokibi family
Analysis: behavioral2
Detonation Overview
Submitted
2023-04-22 03:51
Reported
2023-04-22 03:53
Platform
win10v2004-20230220-en
Max time kernel
119s
Max time network
127s
Command Line
Signatures
Sodin,Sodinokibi,REvil
Modifies extensions of user files
| Description | Indicator | Process | Target |
| File renamed | C:\Users\Admin\Pictures\PopExport.png => \??\c:\users\admin\pictures\PopExport.png.4e53o7o | C:\Users\Admin\AppData\Local\Temp\2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe | N/A |
| File renamed | C:\Users\Admin\Pictures\PopResize.crw => \??\c:\users\admin\pictures\PopResize.crw.4e53o7o | C:\Users\Admin\AppData\Local\Temp\2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe | N/A |
| File renamed | C:\Users\Admin\Pictures\ResumeDisable.crw => \??\c:\users\admin\pictures\ResumeDisable.crw.4e53o7o | C:\Users\Admin\AppData\Local\Temp\2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe | N/A |
| File renamed | C:\Users\Admin\Pictures\CloseSuspend.png => \??\c:\users\admin\pictures\CloseSuspend.png.4e53o7o | C:\Users\Admin\AppData\Local\Temp\2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe | N/A |
Enumerates connected drives
Sets desktop wallpaper using registry
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\nf13w6063.bmp" | C:\Users\Admin\AppData\Local\Temp\2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe | N/A |
Drops file in Program Files directory
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeBackupPrivilege | N/A | C:\Windows\system32\vssvc.exe | N/A |
| Token: SeRestorePrivilege | N/A | C:\Windows\system32\vssvc.exe | N/A |
| Token: SeAuditPrivilege | N/A | C:\Windows\system32\vssvc.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3532 wrote to memory of 2728 | N/A | C:\Users\Admin\AppData\Local\Temp\2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
| PID 3532 wrote to memory of 2728 | N/A | C:\Users\Admin\AppData\Local\Temp\2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
Uses Volume Shadow Copy service COM API
Processes
C:\Users\Admin\AppData\Local\Temp\2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe
"C:\Users\Admin\AppData\Local\Temp\2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
C:\Windows\system32\wbem\unsecapp.exe
C:\Windows\system32\wbem\unsecapp.exe -Embedding
C:\Windows\system32\vssvc.exe
C:\Windows\system32\vssvc.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 67.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 32.146.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| IE | 20.54.89.15:443 | tcp | |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 2.36.159.162.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 233.141.123.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 157.123.68.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 8.3.197.209.in-addr.arpa | udp |
| NL | 173.223.113.164:443 | tcp | |
| NL | 173.223.113.131:80 | tcp | |
| US | 131.253.33.203:80 | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0ozfqmwy.nyk.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
memory/2728-142-0x0000014AF8ED0000-0x0000014AF8EF2000-memory.dmp
memory/2728-144-0x0000014ADFA10000-0x0000014ADFA20000-memory.dmp
memory/2728-143-0x0000014ADFA10000-0x0000014ADFA20000-memory.dmp
memory/2728-145-0x0000014ADFA10000-0x0000014ADFA20000-memory.dmp
C:\Recovery\4e53o7o-readme.txt
| MD5 | 79d8c8c6230fd6abb73d16dbc2ee6581 |
| SHA1 | e127ba2c6c81158d3b5e9abfbdfe1096f2576e1e |
| SHA256 | 0aaf3d8d7326b50ceb25f455a7446ec2df5023f08420a680eb5209efe457b210 |
| SHA512 | bd3d624f7bb9cebf8702d4d59f2117056cc5a1c05f58eb8468e321ba9c71fe24d1cecff5c6a9df413e33dc44ae0436d5adb598ec2ad65fc06f9de5a60238c110 |
Analysis: behavioral1
Detonation Overview
Submitted
2023-04-22 03:51
Reported
2023-04-22 03:53
Platform
win7-20230220-en
Max time kernel
31s
Max time network
36s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe
"C:\Users\Admin\AppData\Local\Temp\2023-04-20_e4be3e7aa3e471f7c42ec7ba35c3d69f_revil.exe"