Analysis

  • max time kernel
    88s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02-06-2023 16:16

General

  • Target

    Revil.exe

  • Size

    119KB

  • MD5

    fa8117afd2dbd20513522f2f8e991262

  • SHA1

    f7b876edb8fc0c83fd8b665d3c5a1050d4396302

  • SHA256

    78b592a2710d81fa91235b445f674ee804db39c8cc34f7e894b4e7b7f6eacaff

  • SHA512

    2bab344d136b31cd7c55b7cd0ef1b7718c9952573f3b1478a2efb8211563d7dedacefd4764a7186e15f7de93cc43fa29fc4d2fa61961a14bb12d7bea830e5032

  • SSDEEP

    3072:KW5yc3Y4SMQwuOekD96R928AN+/uSxo+HHz/bs/k4OS:K83Y5BAxa92KrxTnz/Y/k4O

Malware Config

Extracted

Family

sodinokibi

Botnet

$2b$13$wz1reRfdLg.aiStLDqg5JeqqySemSPatWKHdwbpWVrC3ty7Akscg6

Campaign

49

Attributes
  • net

    false

  • pid

    $2b$13$wz1reRfdLg.aiStLDqg5JeqqySemSPatWKHdwbpWVrC3ty7Akscg6

  • prc

    vsnapvss

    EnterpriseClient

    firefox

    infopath

    cvd

    tv_x64.exe

    VeeamTransportSvc

    steam

    encsvc

    mydesktopservice

    outlook

    synctime

    ocssd

    SAP

    cvfwd

    bengien

    vxmon

    bedbh

    ocomm

    ocautoupds

    raw_agent_svc

    oracle

    disk+work

    powerpnt

    saposcol

    sqbcoreservice

    sapstartsrv

    beserver

    saphostexec

    dbeng50

    isqlplussvc

    CVODS

    DellSystemDetect

    CVMountd

    TeamViewer.exe

    dbsnmp

    thunderbird

    mspub

    wordpad

    visio

    benetns

    QBCFMonitorService

    TeamViewer_Service.exe

    tv_w32.exe

    QBIDPService

    winword

    thebat

    VeeamDeploymentSvc

    avagent

    QBDBMgrN

    mydesktopqos

    xfssvccon

    sql

    tbirdconfig

    CagService

    pvlsvr

    avscc

    VeeamNFSSvc

    onenote

    excel

    msaccess

    agntsvc

  • ransom_oneliner

    All of your files are encrypted! Find EDGEWATER-README.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] What's Happened? [+] Your files have been encrypted and currently unavailable. You can check it. All files in your system have {EXT} extension. By the way, everything is possible to recover (restore) but you should follow our instructions. Otherwise you can NEVER return your data. [+] What are our guarantees? [+] It's just a business and we care only about getting benefits. If we don't meet our obligations, nobody will deal with us. It doesn't hold our interest. So you can check the ability to restore your files. For this purpose you should visit our website where you can decrypt one file for free. That is our guarantee. It doesn't metter for us whether you cooperate with us or not. But if you don't, you'll lose your time and data cause only we have the private key to decrypt your files. In practice - time is much more valuable than money. [+] How to get access to our website? [+] Use TOR browser: 1. Download and install TOR browser from this site: https://torproject.org/ 2. Visit our website: http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion When you visit our website, put the following data into the input form: Key: {KEY} !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software or antivirus solutions to restore your data - it may entail the private key damage and as a result all your data loss! !!! !!! !!! ONE MORE TIME: It's in your best interests to get your files back. From our side we (the best specialists in this sphere) ready to make everything for restoring but please do not interfere. !!! !!! !!

  • sub

    49

  • svc

    QBCFMonitorService

    thebat

    dbeng50

    winword

    dbsnmp

    VeeamTransportSvc

    disk+work

    TeamViewer_Service.exe

    firefox

    QBIDPService

    steam

    onenote

    CVMountd

    cvd

    VeeamDeploymentSvc

    VeeamNFSSvc

    bedbh

    mydesktopqos

    avscc

    infopath

    cvfwd

    excel

    beserver

    powerpnt

    mspub

    synctime

    QBDBMgrN

    tv_w32.exe

    EnterpriseClient

    msaccess

    ocssd

    mydesktopservice

    sqbcoreservice

    CVODS

    DellSystemDetect

    oracle

    ocautoupds

    wordpad

    visio

    SAP

    bengien

    TeamViewer.exe

    agntsvc

    CagService

    avagent

    ocomm

    outlook

    saposcol

    xfssvccon

    isqlplussvc

    pvlsvr

    sql

    tbirdconfig

    vxmon

    benetns

    tv_x64.exe

    encsvc

    sapstartsrv

    vsnapvss

    raw_agent_svc

    thunderbird

    saphostexec

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Drops desktop.ini file(s) 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Revil.exe
    "C:\Users\Admin\AppData\Local\Temp\Revil.exe"
    1⤵
      PID:1992
    • C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe
      "C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe"
      1⤵
      • Drops desktop.ini file(s)
      • Suspicious behavior: GetForegroundWindowSpam
      PID:112
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x57c
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1760
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Desktop\DismountRead.docx"
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1308

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      e3551164187a410f87ad8c66752e6720

      SHA1

      1ca90a99d02bd3dffb2e2de968aa005680107174

      SHA256

      40f7964310e22f706237c96d225f98f75a4f80b03dc29e4e39318f41aeffcd35

      SHA512

      b00a035a02724c92b776f919dd9c1c4b83ec638364e00add14b7041c5a39699003120cfa7328b233bbacc6f2d17eebedd0b7c19b6f6bba5a1017800e308b8518

    • C:\Users\Admin\Saved Games\Microsoft Games\Purble Place\desktop.ini
      Filesize

      94B

      MD5

      5fee8c846e9b919705407a20885194ab

      SHA1

      a1aa27e0366ae24c0c5f3a92bb38817615437080

      SHA256

      ea27260dffe170fc8c7987da31e3b5536795a9e30c76a2e6d4047db474a9617d

      SHA512

      e39ea9473731e201caef09ac448cc333ac7377df6deec1781b54e7d51af41a7e5717725db56088cb2adbe0c647eea2bba91e8a95ad77eaa8d6446c7aea890c11

    • memory/112-77-0x0000000001D30000-0x0000000001D3A000-memory.dmp
      Filesize

      40KB

    • memory/112-83-0x0000000001F00000-0x0000000001F0A000-memory.dmp
      Filesize

      40KB

    • memory/112-78-0x0000000001D30000-0x0000000001D3A000-memory.dmp
      Filesize

      40KB

    • memory/112-59-0x0000000001D30000-0x0000000001D3A000-memory.dmp
      Filesize

      40KB

    • memory/112-60-0x0000000001D30000-0x0000000001D3A000-memory.dmp
      Filesize

      40KB

    • memory/112-61-0x0000000001D30000-0x0000000001D3A000-memory.dmp
      Filesize

      40KB

    • memory/112-67-0x0000000001F00000-0x0000000001F0A000-memory.dmp
      Filesize

      40KB

    • memory/112-66-0x0000000001F00000-0x0000000001F0A000-memory.dmp
      Filesize

      40KB

    • memory/112-68-0x0000000001F00000-0x0000000001F0A000-memory.dmp
      Filesize

      40KB

    • memory/112-69-0x0000000001F00000-0x0000000001F0A000-memory.dmp
      Filesize

      40KB

    • memory/112-74-0x0000000001CF0000-0x0000000001CF1000-memory.dmp
      Filesize

      4KB

    • memory/112-75-0x0000000001D30000-0x0000000001D3A000-memory.dmp
      Filesize

      40KB

    • memory/112-58-0x0000000001D30000-0x0000000001D3A000-memory.dmp
      Filesize

      40KB

    • memory/112-55-0x0000000001CF0000-0x0000000001CF1000-memory.dmp
      Filesize

      4KB

    • memory/112-85-0x0000000001F00000-0x0000000001F0A000-memory.dmp
      Filesize

      40KB

    • memory/112-79-0x0000000001D30000-0x0000000001D3A000-memory.dmp
      Filesize

      40KB

    • memory/112-80-0x0000000001D30000-0x0000000001D3A000-memory.dmp
      Filesize

      40KB

    • memory/112-81-0x0000000001F00000-0x0000000001F0A000-memory.dmp
      Filesize

      40KB

    • memory/112-82-0x0000000001F00000-0x0000000001F0A000-memory.dmp
      Filesize

      40KB

    • memory/112-57-0x0000000001D30000-0x0000000001D3A000-memory.dmp
      Filesize

      40KB

    • memory/112-84-0x0000000001F00000-0x0000000001F0A000-memory.dmp
      Filesize

      40KB

    • memory/112-76-0x0000000001D30000-0x0000000001D3A000-memory.dmp
      Filesize

      40KB

    • memory/112-56-0x0000000001D30000-0x0000000001D3A000-memory.dmp
      Filesize

      40KB

    • memory/112-102-0x0000000001D30000-0x0000000001D32000-memory.dmp
      Filesize

      8KB

    • memory/1308-103-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1308-127-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1992-54-0x0000000000020000-0x0000000000040000-memory.dmp
      Filesize

      128KB