Analysis
-
max time kernel
101s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 22:24
Behavioral task
behavioral1
Sample
revil-fixed.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
revil-fixed.exe
Resource
win10v2004-20250314-en
General
-
Target
revil-fixed.exe
-
Size
126KB
-
MD5
329b8aaea517a511908683b56446db99
-
SHA1
9abe20a9c460a3e530cb96658541c6d25700a529
-
SHA256
c09c691d40d8b935de4b60c92e1d4fc85f409fb546fd4a5e5b5483ae150fbf20
-
SHA512
172d290abe8fef35e8bea43319dc68092c61389257c73e94fcde68f67f97022c1bbda1fe50cd35775bda6e2473af1bad0e5cdb2ff7060e8365bbbe4765a3b3fa
-
SSDEEP
1536:oxOUyl20w8bVZQ40iMSO1fY+iUyQs2r8t5p1ySotICS4A6QdZls8XzUXiWr4X5Fg:oMhQNDEtb3A2ZHjUyWr4X5FTDUA
Malware Config
Extracted
C:\Program Files (x86)\956w42-readme.txt
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/FB777F1C95764FDB
http://decoder.re/FB777F1C95764FDB
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1372 netsh.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: revil-fixed.exe File opened (read-only) \??\H: revil-fixed.exe File opened (read-only) \??\I: revil-fixed.exe File opened (read-only) \??\Q: revil-fixed.exe File opened (read-only) \??\T: revil-fixed.exe File opened (read-only) \??\B: revil-fixed.exe File opened (read-only) \??\E: revil-fixed.exe File opened (read-only) \??\G: revil-fixed.exe File opened (read-only) \??\J: revil-fixed.exe File opened (read-only) \??\N: revil-fixed.exe File opened (read-only) \??\O: revil-fixed.exe File opened (read-only) \??\W: revil-fixed.exe File opened (read-only) \??\Y: revil-fixed.exe File opened (read-only) \??\M: revil-fixed.exe File opened (read-only) \??\U: revil-fixed.exe File opened (read-only) \??\V: revil-fixed.exe File opened (read-only) \??\X: revil-fixed.exe File opened (read-only) \??\F: revil-fixed.exe File opened (read-only) \??\D: revil-fixed.exe File opened (read-only) \??\K: revil-fixed.exe File opened (read-only) \??\L: revil-fixed.exe File opened (read-only) \??\P: revil-fixed.exe File opened (read-only) \??\R: revil-fixed.exe File opened (read-only) \??\S: revil-fixed.exe File opened (read-only) \??\Z: revil-fixed.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\mthj31y.bmp" revil-fixed.exe -
Drops file in Program Files directory 35 IoCs
description ioc Process File opened for modification \??\c:\program files\ImportUpdate.gif revil-fixed.exe File opened for modification \??\c:\program files\InstallUnblock.M2TS revil-fixed.exe File opened for modification \??\c:\program files\MergePublish.wpl revil-fixed.exe File opened for modification \??\c:\program files\StepCheckpoint.M2V revil-fixed.exe File opened for modification \??\c:\program files\TraceDisconnect.potx revil-fixed.exe File opened for modification \??\c:\program files\UnpublishConvertTo.mp4 revil-fixed.exe File created \??\c:\program files (x86)\956w42-readme.txt revil-fixed.exe File opened for modification \??\c:\program files\NewDeny.jpe revil-fixed.exe File opened for modification \??\c:\program files\NewUnpublish.xlsx revil-fixed.exe File opened for modification \??\c:\program files\OpenSync.dwg revil-fixed.exe File opened for modification \??\c:\program files\ProtectMove.mp2 revil-fixed.exe File opened for modification \??\c:\program files\ReadUnblock.xhtml revil-fixed.exe File opened for modification \??\c:\program files\UseExport.wma revil-fixed.exe File created \??\c:\program files (x86)\tmp revil-fixed.exe File opened for modification \??\c:\program files\DismountNew.mid revil-fixed.exe File opened for modification \??\c:\program files\SkipSuspend.jfif revil-fixed.exe File opened for modification \??\c:\program files\SwitchUnblock.kix revil-fixed.exe File opened for modification \??\c:\program files\UndoExit.m4v revil-fixed.exe File opened for modification \??\c:\program files\CompleteEnable.m4v revil-fixed.exe File opened for modification \??\c:\program files\msedge_installer.log revil-fixed.exe File opened for modification \??\c:\program files\OpenMove.TS revil-fixed.exe File opened for modification \??\c:\program files\RestoreGrant.pptm revil-fixed.exe File created \??\c:\program files\tmp revil-fixed.exe File opened for modification \??\c:\program files\EditRemove.bmp revil-fixed.exe File opened for modification \??\c:\program files\UnlockSuspend.htm revil-fixed.exe File created \??\c:\program files\956w42-readme.txt revil-fixed.exe File opened for modification \??\c:\program files\RequestSplit.eps revil-fixed.exe File opened for modification \??\c:\program files\RevokeRead.TS revil-fixed.exe File opened for modification \??\c:\program files\SubmitOptimize.dib revil-fixed.exe File opened for modification \??\c:\program files\UndoAssert.m4a revil-fixed.exe File opened for modification \??\c:\program files\UpdateSave.tif revil-fixed.exe File opened for modification \??\c:\program files\UnpublishImport.dib revil-fixed.exe File opened for modification \??\c:\program files\chrome_installer.log revil-fixed.exe File opened for modification \??\c:\program files\PingConvertFrom.bmp revil-fixed.exe File opened for modification \??\c:\program files\PingTest.TS revil-fixed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language revil-fixed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4784 revil-fixed.exe 4784 revil-fixed.exe 4784 revil-fixed.exe 4784 revil-fixed.exe 4784 revil-fixed.exe 4784 revil-fixed.exe 4784 revil-fixed.exe 4784 revil-fixed.exe 4784 revil-fixed.exe 4784 revil-fixed.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4784 revil-fixed.exe Token: SeTakeOwnershipPrivilege 4784 revil-fixed.exe Token: SeBackupPrivilege 1428 vssvc.exe Token: SeRestorePrivilege 1428 vssvc.exe Token: SeAuditPrivilege 1428 vssvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4784 wrote to memory of 1372 4784 revil-fixed.exe 92 PID 4784 wrote to memory of 1372 4784 revil-fixed.exe 92 PID 4784 wrote to memory of 1372 4784 revil-fixed.exe 92 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\revil-fixed.exe"C:\Users\Admin\AppData\Local\Temp\revil-fixed.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall set rule group="Network Discovery" new enable=Yes2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1372
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:4208
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1428
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD553e2e2e19116dbba8e07da7b3c418179
SHA18d4a6bff392b42e57b6228b6d0a41ad2b2639b0a
SHA2561e6482872d94cb5b9f1061f3b8565a8be68df6dd2e859ba26ba1e0acb4688361
SHA51298b0686c07dfa8f262215bee68d7d05cac73abf74a26db58eaa04ce0efbf9f34fca409625817d990e306930fa4f833727088c895d17d40f95667b255a41f3eca