Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03-02-2024 19:18

General

  • Target

    revil.exe

  • Size

    119KB

  • MD5

    a4331ff805b0a8f2a2892777c224b65e

  • SHA1

    2c5521077dd1a6f5f3558351370880aee9ab7c71

  • SHA256

    329983dc2a23bd951b24780947cb9a6ae3fb80d5ef546e8538dfd9459b176483

  • SHA512

    786a6ffdd7206b0f11dd45921826e3685fe4b64b82b4fa26702a30dcb762d4310b3b55683a8c510175ed6a9086125156e676caa3220597f8ed7298f6cdc51799

  • SSDEEP

    3072:KW5yc3Y4SMQwuOekD96R928A2fFM+/uSxo+HHz/bs/k4OS:K83Y5BAxa92c1rxTnz/Y/k4O

Malware Config

Extracted

Family

sodinokibi

Botnet

$2b$13$wz1reRfdLg.aiStLDqg5JeqqySemSPatWKHdwbpWVrC3ty7Akscg6

Campaign

58

Attributes
  • net

    false

  • pid

    $2b$13$wz1reRfdLg.aiStLDqg5JeqqySemSPatWKHdwbpWVrC3ty7Akscg6

  • prc

    vsnapvss

    EnterpriseClient

    firefox

    infopath

    cvd

    tv_x64.exe

    VeeamTransportSvc

    steam

    encsvc

    mydesktopservice

    outlook

    synctime

    ocssd

    SAP

    cvfwd

    bengien

    vxmon

    bedbh

    ocomm

    ocautoupds

    raw_agent_svc

    oracle

    disk+work

    powerpnt

    saposcol

    sqbcoreservice

    sapstartsrv

    beserver

    saphostexec

    dbeng50

  • ransom_oneliner

    All of your files are encrypted! Find {EXT}-README.txt and follow instuctions

  • ransom_template

    ---=== Welcome. Again. ===--- [+] What's Happened? [+] Your files have been encrypted and currently unavailable. You can check it. All files in your system have {EXT} extension. By the way, everything is possible to recover (restore) but you should follow our instructions. Otherwise you can NEVER return your data. [+] What are our guarantees? [+] It's just a business and we care only about getting benefits. If we don't meet our obligations, nobody will deal with us. It doesn't hold our interest. So you can check the ability to restore your files. For this purpose you should visit our website where you can decrypt one file for free. That is our guarantee. It doesn't metter for us whether you cooperate with us or not. But if you don't, you'll lose your time and data cause only we have the private key to decrypt your files. In practice - time is much more valuable than money. [+] How to get access to our website? [+] Use TOR browser: 1. Download and install TOR browser from this site: https://torproject.org/ 2. Visit our website: http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion When you visit our website, put the following data into the input form: Key: {KEY} !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software or antivirus solutions to restore your data - it may entail the private key damage and as a result all your data loss! !!! !!! !!! ONE MORE TIME: It's in your best interests to get your files back. From our side we (the best specialists in this sphere) ready to make everything for restoring but please do not interfere. !!! !!! !!

  • sub

    58

  • svc

    QBCFMonitorService

    thebat

    dbeng50

    winword

    dbsnmp

    VeeamTransportSvc

    disk+work

    TeamViewer_Service.exe

    firefox

    QBIDPService

    steam

    onenote

    CVMountd

    cvd

    VeeamDeploymentSvc

    VeeamNFSSvc

    bedbh

    mydesktopqos

    avscc

    infopath

    cvfwd

    excel

    beserver

    powerpnt

    mspub

    synctime

    QBDBMgrN

    tv_w32.exe

    EnterpriseClient

    msaccess

Extracted

Path

C:\Users\0w17h09g8-README.txt

Ransom Note
---=== Welcome. Again. ===--- [+] What's Happened? [+] Your files have been encrypted and currently unavailable. You can check it. All files in your system have 0w17h09g8 extension. By the way, everything is possible to recover (restore) but you should follow our instructions. Otherwise you can NEVER return your data. [+] What are our guarantees? [+] It's just a business and we care only about getting benefits. If we don't meet our obligations, nobody will deal with us. It doesn't hold our interest. So you can check the ability to restore your files. For this purpose you should visit our website where you can decrypt one file for free. That is our guarantee. It doesn't metter for us whether you cooperate with us or not. But if you don't, you'll lose your time and data cause only we have the private key to decrypt your files. In practice - time is much more valuable than money. [+] How to get access to our website? [+] Use TOR browser: 1. Download and install TOR browser from this site: https://torproject.org/ 2. Visit our website: http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion When you visit our website, put the following data into the input form: Key: 8RL+n4ryDltxjN9XXPvzVn6eR9NbqRAg32lQDQB4NA6SHLY6ef0DIh15hp3KzlpD GbPUyD0KXLP2rzVJ88seU2u0g6RDAKoFCdO8xdgujUMv5WdaVtBlIVufc9KTOB2Q HFn3E52K8v3BQYgFdxRZyukVlKIN7HoCQssaQJY22Ps5JkV//L84PaWHrmmIUO09 qDI5b4Vq7VfR6RE3/P4MFrsVwCJqWbVWBNN46NqT0LknAJaHmEiEaL197uUoGbNp 5tEIi6oydh5AAAeU1jQUlwxkmm34ff2uwp5ZtlAhI7NVGX9uGHMq4OdB7cXgWq88 TF6k/z961bqfD9XZjGktv/7J60FExC0oLRV9hvQLB5XVS7evtxi0mtgChr0sKhzg wWgYjckwx5ua4akWkM7fUY+1odCBO8WiZgFmVCLSudF+LKPUlQ852TKwXojYHqad jeYZ9eCzfiBr4d7l5YfV8ywHPvGzm0OIBERZxXu9/vCprLXxqou7t3OBssNr1A+i ZWLr/uex30ws359cVChquvmIJtKwpW3aXJ8wAav6T7i4h+B0qx83LRkhCD86P9xT K3EmAsSY77FyLWZ5dlPKlNzMgzOSnN8jLZemiCIrtn0ZBsF7hFdQ69tNaBW88fOi MwDR/OX0ZC03U1R5u3XAMzHqfVQhVOVsEAwY30oKG1sDc5hNHs4Pou1g4nN40QKT gs2/PZHG3MvQtswmylL6mRvEd+xki/+VYmY7QS3Z8kqBZH7zRxr6l4CnN9A+hJfH YV11y3/dco+EC1gXjWEtYm37GOP6pwpCVnk+7WWE7Ej5GPH+jaM3wTOhuAQN80uw xk9BwhBWa6/Qnj0bm32SBBXpgDiZDzigEmUCQouu1rNYZORQJ9D+Rodd8jap/GsG YgikeoyzmDSEq6MIK5HPVY6EQP/TVrSB0dxgxSbA6NZ4vh8CR9Ik03U+ngX2EpWe hDvKh2ycRvenTkaPVaY6fbEBZg+giRqh4BT2I5rYXOImZBsfYqBD91WxT07Cat6c SCLyWTWCUWta2XT2vjYqtkg18iG9OD996RRtTmq9q5uD1U5zdDyeAqTTuYp5vnzt UNTMtnsSPXnfxPwBB6xglvgiO8h37hnti3ymV1PZaUpkfWnUmCkhchYQ1cSM+oK0 mh8LVF9UsbxZRxhHGFdXidDmyknlwM49TUBg4k7PIkqS4bT6MX9Sy//yp98fq6/y NBDzwHWoTv9XsWD5+KKKWA1wF27GawuIuOaWS4qEBh6vClMATJuMs8F2OOZvx7zK LO5rdY8E/e26cUokvuigMk5M7bqjh+qy0KsysmD8ijOZidcqcqkXRoc6ZKUD8g0S zlk4wCMxPMbSFtDfdBaB2EAvFc//2PKFVFqpxxZ1Bw14gw== !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software or antivirus solutions to restore your data - it may entail the private key damage and as a result all your data loss! !!! !!! !!! ONE MORE TIME: It's in your best interests to get your files back. From our side we (the best specialists in this sphere) ready to make everything for restoring but please do not interfere. !!! !!! !!
URLs

http://4to43yp4mng2gdc3jgnep5bt7lkhqvjqiritbv4x2ebj3qun7wz4y2id.onion

Signatures

  • Sodin,Sodinokibi,REvil

    Ransomware with advanced anti-analysis and privilege escalation functionality.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\revil.exe
    "C:\Users\Admin\AppData\Local\Temp\revil.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2940
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:2776
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2588

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\0w17h09g8-README.txt

      Filesize

      6KB

      MD5

      c6ec02fba0560935c299e41bfab299e4

      SHA1

      fea844d38f3af926ac46ad26a636ce0ef9ca02ad

      SHA256

      e060639909323d1d305d6b6ad386e9c421f5d14326b2ed0616d6781d8c966704

      SHA512

      a01ece41498866eb24cb9a03fbec9306d09662a4f1c85b193846b4d06339fe9cb236fb3676bb1fc783b402c87217008e9a4000065bbc18e8d10952b0f24f01bd

    • memory/2272-0-0x0000000000020000-0x0000000000040000-memory.dmp

      Filesize

      128KB

    • memory/2272-1-0x0000000000020000-0x0000000000040000-memory.dmp

      Filesize

      128KB

    • memory/2272-523-0x0000000000020000-0x0000000000040000-memory.dmp

      Filesize

      128KB

    • memory/2272-505-0x0000000000020000-0x0000000000040000-memory.dmp

      Filesize

      128KB

    • memory/2272-14-0x0000000000020000-0x0000000000040000-memory.dmp

      Filesize

      128KB

    • memory/2940-10-0x000007FEF5490000-0x000007FEF5E2D000-memory.dmp

      Filesize

      9.6MB

    • memory/2940-11-0x00000000029B0000-0x0000000002A30000-memory.dmp

      Filesize

      512KB

    • memory/2940-12-0x00000000029B0000-0x0000000002A30000-memory.dmp

      Filesize

      512KB

    • memory/2940-13-0x000007FEF5490000-0x000007FEF5E2D000-memory.dmp

      Filesize

      9.6MB

    • memory/2940-9-0x00000000029B0000-0x0000000002A30000-memory.dmp

      Filesize

      512KB

    • memory/2940-8-0x000007FEF5490000-0x000007FEF5E2D000-memory.dmp

      Filesize

      9.6MB

    • memory/2940-7-0x00000000023F0000-0x00000000023F8000-memory.dmp

      Filesize

      32KB

    • memory/2940-6-0x000000001B530000-0x000000001B812000-memory.dmp

      Filesize

      2.9MB