Analysis

  • max time kernel
    139s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2025, 08:29

General

  • Target

    2025-03-14_b66ef055f69d2d1a1d8a6f7128cc34a4_revil.exe

  • Size

    92KB

  • MD5

    b66ef055f69d2d1a1d8a6f7128cc34a4

  • SHA1

    b0bdbebb93abe1c437d9b8f243368ca0de74603a

  • SHA256

    c7d0fa4e911df7241f9385a109ad4814d10fb640bb8151e7d1abeec1065bcacd

  • SHA512

    c052dd76b90cad8b5d40409d00ef41d3e75439edab7e6cb79d60ec98bd17af172e4e56fa031bf1cd5256d7baa0f6ea13648044da641df90e992f36432fe0d64a

  • SSDEEP

    1536:Y73nkB0DyMgQSm9NwcKzwpR+7JICS4ABwZ/gsZujGC:c/hKzstg5gs2

Malware Config

Extracted

Path

C:\Program Files (x86)\g3676-readme.txt

Ransom Note
---=== Welcome. Again. ===--- [-] Whats Happen? [-] All your data were stolen. Your files are encrypted, and currently unavailable. You can check it: all files on your system has extension g3676. By the way, everything is possible to recover (restore), but you need to follow our instructions. Otherwise, you cant return your data (NEVER). [-] What guarantees? [-] Its just a business. We absolutely do not care about you and your deals, except getting benefits. If we do not do our work and liabilities - nobody will not cooperate with us. Its not in our interests. To check the ability of returning files, You should go to our website. There you can decrypt one file for free. That is our guarantee. If you will not cooperate with our service - for us, its does not matter. But you will lose your time and data, cause just we have the private key. In practice - time is much more valuable than money. [+] How to get access on website? [+] Using a TOR browser! 1) Download and install TOR browser from this site: https://torproject.org/ 2) Open our website: http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/25A19BB6D3A8825B Warning: secondary website can be blocked, thats why first variant much better and more available. When you open our website, put the following data in the input form: Key: gUR+z5gfUtYtnxOTNZ98PmNpZ1lUcA7h2q4AJDWqBiVZI8wn4POnpjKymWrrEUe+ X/Xv72omXfkxCa/e0SbEf5PxTP3Lhtnt/C+gi8UCN18MPujuEM0i0lGmgJ6ia4tu ETwXBAEeLGmt0LwLehJF9eK2Y67D7/1sGMsD37DM1ML6GchkqqAc3hfLdwLOva5L I9PT8XhP8xgMq8Y/+6sfVcVbSQ1VH3SAF/JZ1Z/NGHoiuGLxYx8fz/7ZYUvR9+MC 6nT5km9nQd2oMhBv3n4beDSmFWoA5IBNg0UGg+9io4tAdggMDwiAifqtkP0ocNUs PMCKevrQi8Ic/Diyr8WpnLK+sgA9tLCmvea2NYDSvK0DQjMyQhACr7n0Ya9/0zvA vRbECJYwR9VHTMvKai47B3B+hU1mPPYcXh6Q8AQFzgFEvtFIwksn3XCsVFV2oNhr 5VNFZMMcRoHpluwwBhq0YT3E4r5gdBB9KmKKjqPwDtaOj012sfLuCZxjRPrAHyqq QeI1itKDDVvwSoPDMQYxXTDNHnAqNWWcp1gIMQHx5ghshDPxIuNJZbBRAJeLUxUM dJFLFosnlzWF5szuCznI7Tss4qMB11tq3T/tC1tDk1t8ryCbZguA3/xr5Y9fBd78 qC6BbqVfiaNeBIncllxjxNGH/vP7lwHDPRlbeoZkZQP3l5P4KQwZOLJuwCEN08Ay NZVBQ6biboLLOOsTPPMOHHbZPmF5rmdBI0X0Y4luFIw3dlEsxirIlxnB7r+P1ETj YUOyCwxQO6Gjv+jCcMVtHNSf8dEQvz3/3hEIFuyS4AKAsE4hyBPvVVFYdYU9Mj/1 YQv9bAmPQT4L4loI55QT/jydh+D6a/n6jHsGQ7kxMOuqCemi5jIFOV7pVO6Kta/f ph+eGqOPHY9P168gZSw315Bis1GXDPF3D7ecYw4Ezyl4/94F281NzCZV2PycHhkV 3thWgdcfxLMMFaDjR+Q0Ihe8c8CMRIVk4KPhWGFT/uYQOVoRsuRJ6bw1wEWlAd9F dUhUWuRAONRh32FHIneWCpk2vA/fz82nAEMaecHmpsdLM1vRAhAoxo08MZDYnFhJ xaLAya0P4RvcoG9lxcTqVWlYAowhmdhtFiaKdXZA22QFyzElTWLz9cbmVhHaK7iN ieRGCubH/qZzYs5RCFxqWa+nDJDs6osLzx1b+qgqlZJ6CUGwdGxawEKDKf4X4SpW zI/4MEmE4I5ac0fzI4IgFC9u9RZWRLZVfUB8TtlQP01RfWk+CAquXKj4Yhl5Zbqh cXLuoppCTjg4k1swqll5Nl9ezYudhanSRXKqIu2FpQ8ZQvQzkpZ/JabVc8e9rjLA UTvriNk62WM6VTWyt3bMqbTOA9/fPjTCfng= ----------------------------------------------------------------------------------------- !!! DANGER !!! DON'T try to change files by yourself, DON'T use any third party software for restoring your data or antivirus solutions - its may entail damage of the private key and, as result, The Loss all data. !!! !!! !!! ONE MORE TIME: Its in your interests to get your files back. From our side, we (the best specialists) make everything for restoring, but please should not interfere. !!! !!! !!!
URLs

http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/25A19BB6D3A8825B

Signatures

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 40 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-14_b66ef055f69d2d1a1d8a6f7128cc34a4_revil.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-14_b66ef055f69d2d1a1d8a6f7128cc34a4_revil.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2128
  • C:\Windows\system32\wbem\unsecapp.exe
    C:\Windows\system32\wbem\unsecapp.exe -Embedding
    1⤵
      PID:3416
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:5680

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\g3676-readme.txt

      Filesize

      6KB

      MD5

      d4fdf921d67a890e96b94779110b8be1

      SHA1

      cf2cd034348b597ac634c3070568107137dca5fa

      SHA256

      23369a1852cff9d7cf1cefa13384c4f6a989bc2d0f6a90b419afb3863492f94d

      SHA512

      24cdc45878cce998088d74a110823be62751f6e7b3831567e0cfd8c4b30b629d78f6bb7edb85ec3794500bdf37bc107099365e8c95c49b81369592d2f636ef61