Analysis
-
max time kernel
438s -
max time network
439s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 22:21
Behavioral task
behavioral1
Sample
revil-fixed.exe
Resource
win10v2004-20250314-en
General
-
Target
revil-fixed.exe
-
Size
126KB
-
MD5
329b8aaea517a511908683b56446db99
-
SHA1
9abe20a9c460a3e530cb96658541c6d25700a529
-
SHA256
c09c691d40d8b935de4b60c92e1d4fc85f409fb546fd4a5e5b5483ae150fbf20
-
SHA512
172d290abe8fef35e8bea43319dc68092c61389257c73e94fcde68f67f97022c1bbda1fe50cd35775bda6e2473af1bad0e5cdb2ff7060e8365bbbe4765a3b3fa
-
SSDEEP
1536:oxOUyl20w8bVZQ40iMSO1fY+iUyQs2r8t5p1ySotICS4A6QdZls8XzUXiWr4X5Fg:oMhQNDEtb3A2ZHjUyWr4X5FTDUA
Malware Config
Extracted
C:\Program Files (x86)\wt6c1-readme.txt
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/C12660539403CA53
http://decoder.re/C12660539403CA53
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3376 netsh.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: revil-fixed.exe File opened (read-only) \??\G: revil-fixed.exe File opened (read-only) \??\H: revil-fixed.exe File opened (read-only) \??\M: revil-fixed.exe File opened (read-only) \??\P: revil-fixed.exe File opened (read-only) \??\S: revil-fixed.exe File opened (read-only) \??\X: revil-fixed.exe File opened (read-only) \??\Y: revil-fixed.exe File opened (read-only) \??\B: revil-fixed.exe File opened (read-only) \??\J: revil-fixed.exe File opened (read-only) \??\R: revil-fixed.exe File opened (read-only) \??\T: revil-fixed.exe File opened (read-only) \??\V: revil-fixed.exe File opened (read-only) \??\Z: revil-fixed.exe File opened (read-only) \??\F: revil-fixed.exe File opened (read-only) \??\D: revil-fixed.exe File opened (read-only) \??\A: revil-fixed.exe File opened (read-only) \??\I: revil-fixed.exe File opened (read-only) \??\N: revil-fixed.exe File opened (read-only) \??\O: revil-fixed.exe File opened (read-only) \??\U: revil-fixed.exe File opened (read-only) \??\W: revil-fixed.exe File opened (read-only) \??\E: revil-fixed.exe File opened (read-only) \??\K: revil-fixed.exe File opened (read-only) \??\L: revil-fixed.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\153rrt7639.bmp" revil-fixed.exe -
Drops file in Program Files directory 26 IoCs
description ioc Process File created \??\c:\program files (x86)\wt6c1-readme.txt revil-fixed.exe File opened for modification \??\c:\program files\BlockOptimize.odt revil-fixed.exe File opened for modification \??\c:\program files\chrome_installer.log revil-fixed.exe File opened for modification \??\c:\program files\DenySearch.ttf revil-fixed.exe File opened for modification \??\c:\program files\DenyStart.kix revil-fixed.exe File opened for modification \??\c:\program files\EnterDebug.wmf revil-fixed.exe File opened for modification \??\c:\program files\MoveImport.vbs revil-fixed.exe File opened for modification \??\c:\program files\RestartResume.ADT revil-fixed.exe File created \??\c:\program files\tmp revil-fixed.exe File opened for modification \??\c:\program files\CopyRegister.kix revil-fixed.exe File opened for modification \??\c:\program files\LockUnprotect.3g2 revil-fixed.exe File opened for modification \??\c:\program files\RequestPop.xltm revil-fixed.exe File opened for modification \??\c:\program files\ResumeUnlock.TS revil-fixed.exe File opened for modification \??\c:\program files\SearchMove.midi revil-fixed.exe File opened for modification \??\c:\program files\ShowCompare.wvx revil-fixed.exe File opened for modification \??\c:\program files\WaitDisconnect.asp revil-fixed.exe File created \??\c:\program files\wt6c1-readme.txt revil-fixed.exe File opened for modification \??\c:\program files\ExportUnlock.xla revil-fixed.exe File opened for modification \??\c:\program files\msedge_installer.log revil-fixed.exe File created \??\c:\program files (x86)\tmp revil-fixed.exe File opened for modification \??\c:\program files\BackupGet.vsd revil-fixed.exe File opened for modification \??\c:\program files\ClearPublish.ttf revil-fixed.exe File opened for modification \??\c:\program files\NewMerge.MTS revil-fixed.exe File opened for modification \??\c:\program files\RequestUpdate.temp revil-fixed.exe File opened for modification \??\c:\program files\ShowTrace.mht revil-fixed.exe File opened for modification \??\c:\program files\UseOptimize.jpe revil-fixed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language revil-fixed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 6004 revil-fixed.exe 6004 revil-fixed.exe 6004 revil-fixed.exe 6004 revil-fixed.exe 6004 revil-fixed.exe 6004 revil-fixed.exe 6004 revil-fixed.exe 6004 revil-fixed.exe 6004 revil-fixed.exe 6004 revil-fixed.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 6004 revil-fixed.exe Token: SeTakeOwnershipPrivilege 6004 revil-fixed.exe Token: SeBackupPrivilege 4856 vssvc.exe Token: SeRestorePrivilege 4856 vssvc.exe Token: SeAuditPrivilege 4856 vssvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 6004 wrote to memory of 3376 6004 revil-fixed.exe 94 PID 6004 wrote to memory of 3376 6004 revil-fixed.exe 94 PID 6004 wrote to memory of 3376 6004 revil-fixed.exe 94 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\revil-fixed.exe"C:\Users\Admin\AppData\Local\Temp\revil-fixed.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6004 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall set rule group="Network Discovery" new enable=Yes2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3376
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:4756
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4856
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5a9d9aadf5097773f0576f72febdd2d2d
SHA1c4cf4ad69c48c6cdd5058a3b1fd6c1af8d469b37
SHA256c9bfb5c0034f5bfc0d9d6b6f1db27c20e69a88ae05602e4f429261a857fd2667
SHA5124192c7b50912fc862316b3d9018ff00a18218bedc1909b67f02f9d73d528d8ce9e6b8e7b7fa498739f7f71acae566820464556c94d8c8e833db2483e230f0056