Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-10-2024 13:46
Static task
static1
Behavioral task
behavioral1
Sample
(2021) REvil.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
(2021) REvil.exe
Resource
win10v2004-20241007-en
General
-
Target
(2021) REvil.exe
-
Size
114KB
-
MD5
77be32b91561d1ac5e36464766b7b0a7
-
SHA1
9c72fe9c8e24b5c0bde50c71d74fb2586c4201ce
-
SHA256
133bf8be0cf7003b83b03579970997d408a930e58ec2726715140520900c06de
-
SHA512
c8d0d6d15322172631b184acf5df86851dff7d8f15fde9cee7d0b7e4919433ec5b096f4079b5acba78d27dcfc42bfc2bcd3f184cb0a54c13b71aeb40f8ea4152
-
SSDEEP
1536:FApx/1k2jbVnO3c+FpR5Q9JzY02pTmZ0ICS4AtebOMZzqFTj5vel1KkK3I:ck2X8M+Fp4vY06A2roFTj5vYc
Malware Config
Extracted
C:\Users\2qj48-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/ABB2F88F6DA4DDED
http://decryptor.cc/ABB2F88F6DA4DDED
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Sodinokibi family
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
(2021) REvil.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\XhJXszhvjk = "C:\\Users\\Admin\\AppData\\Local\\Temp\\(2021) REvil.exe" (2021) REvil.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
(2021) REvil.exedescription ioc process File opened (read-only) \??\F: (2021) REvil.exe File opened (read-only) \??\A: (2021) REvil.exe File opened (read-only) \??\G: (2021) REvil.exe File opened (read-only) \??\I: (2021) REvil.exe File opened (read-only) \??\N: (2021) REvil.exe File opened (read-only) \??\S: (2021) REvil.exe File opened (read-only) \??\T: (2021) REvil.exe File opened (read-only) \??\W: (2021) REvil.exe File opened (read-only) \??\E: (2021) REvil.exe File opened (read-only) \??\H: (2021) REvil.exe File opened (read-only) \??\L: (2021) REvil.exe File opened (read-only) \??\P: (2021) REvil.exe File opened (read-only) \??\R: (2021) REvil.exe File opened (read-only) \??\U: (2021) REvil.exe File opened (read-only) \??\D: (2021) REvil.exe File opened (read-only) \??\B: (2021) REvil.exe File opened (read-only) \??\J: (2021) REvil.exe File opened (read-only) \??\K: (2021) REvil.exe File opened (read-only) \??\O: (2021) REvil.exe File opened (read-only) \??\Q: (2021) REvil.exe File opened (read-only) \??\Y: (2021) REvil.exe File opened (read-only) \??\Z: (2021) REvil.exe File opened (read-only) \??\M: (2021) REvil.exe File opened (read-only) \??\V: (2021) REvil.exe File opened (read-only) \??\X: (2021) REvil.exe -
Drops file in System32 directory 1 IoCs
Processes:
(2021) REvil.exedescription ioc process File opened for modification C:\Windows\System32\CatRoot2\dberr.txt (2021) REvil.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
(2021) REvil.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\y2w.bmp" (2021) REvil.exe -
Drops file in Program Files directory 14 IoCs
Processes:
(2021) REvil.exedescription ioc process File created \??\c:\program files (x86)\2qj48-readme.txt (2021) REvil.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\2qj48-readme.txt (2021) REvil.exe File opened for modification \??\c:\program files\CheckpointTrace.wma (2021) REvil.exe File opened for modification \??\c:\program files\FindWait.mpeg (2021) REvil.exe File opened for modification \??\c:\program files\GetExpand.png (2021) REvil.exe File opened for modification \??\c:\program files\MountTrace.bin (2021) REvil.exe File opened for modification \??\c:\program files\RepairOut.mpeg3 (2021) REvil.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\2qj48-readme.txt (2021) REvil.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\2qj48-readme.txt (2021) REvil.exe File opened for modification \??\c:\program files\LimitFormat.dxf (2021) REvil.exe File opened for modification \??\c:\program files\NewSubmit.wmx (2021) REvil.exe File opened for modification \??\c:\program files\UninstallRead.ppsm (2021) REvil.exe File created \??\c:\program files\2qj48-readme.txt (2021) REvil.exe File opened for modification \??\c:\program files\NewUpdate.au (2021) REvil.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
(2021) REvil.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language (2021) REvil.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
(2021) REvil.exepowershell.exepid process 1852 (2021) REvil.exe 2472 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
(2021) REvil.exepowershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 1852 (2021) REvil.exe Token: SeDebugPrivilege 2472 powershell.exe Token: SeBackupPrivilege 2428 vssvc.exe Token: SeRestorePrivilege 2428 vssvc.exe Token: SeAuditPrivilege 2428 vssvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
(2021) REvil.exedescription pid process target process PID 1852 wrote to memory of 2472 1852 (2021) REvil.exe powershell.exe PID 1852 wrote to memory of 2472 1852 (2021) REvil.exe powershell.exe PID 1852 wrote to memory of 2472 1852 (2021) REvil.exe powershell.exe PID 1852 wrote to memory of 2472 1852 (2021) REvil.exe powershell.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\(2021) REvil.exe"C:\Users\Admin\AppData\Local\Temp\(2021) REvil.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2512
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5331517cf68604be7d8ddfbd5344eb0b8
SHA1934214eca48054e4c630d7233b7ae9134554bd22
SHA2566311d6aebe87e821a8f9d58cbf1e09a57d8cb9a06216cb20b22799c3ddbb7369
SHA512e891a3424b37b47d9823a2149a0e6b1cd31b521cd956c5e13699ad97ad0a36a80b31b1be6a4cd98ef15cf186baa1ffe4cdda9e32e22a8cf9b944aa5571835366
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
191KB
MD5c55fa108f0172eed8cf84e58443b1221
SHA106e94d5c1abd949242806912e64e43c9c4cc0097
SHA2568a287f9379009271d679b97d8e3a773699f1dea4e3807896f81757e526fdbd45
SHA512089a532396a04bbf5499d0fc6427120cc6ed354782aae2eb3b79b474263435cd0edd6c6e078530cc97beea61ed76fbdc0340987e1a2b84b8c23c4824858b92ad