Managed XDR
Group-IB MDP Report
File info
Filename: 6.exe
File Type: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
File Size: 1.2 MB
Env info
win7/x86 en
Hashes
SHA1: 74b56532df03962e2258f04f457e9b9e67275a0a
SHA256: 82978abf00802152a2e4e5389fa7f60f5e37dfa60261b83616f1dba4fee2d9cf
MD5: c6e700f4ed7100def47f4a6da1ae7bb4
Malwares
Sodinokibi
REvil
Signatures
Execution
T1059.001 suspicious_powershell: Creates suspicious powershell process
T1047 has_wmi: Executes one or several WMI requests
Persistence
T1547.001 persistence_autorun: Makes itself run automatically on Windows startup
T1543.003 persistence_services: Modifies Services registry key
T1574.011 persistence_services: Modifies Services registry key
Privilege Escalation
T1547.001 persistence_autorun: Makes itself run automatically on Windows startup
T1543.003 persistence_services: Modifies Services registry key
T1574.011 persistence_services: Modifies Services registry key
T1134 sets_privilegies_via_rtladjustprivilege: Sets process privilege via RtlAdjustPrivilege
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1497.001 antivm_disk_size: Checks the amount of free disk space
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
T1574.011 persistence_services: Modifies Services registry key
T1497 evasion_diskenum: Sandbox evasion using enumeration of partitions
T1497.001 antivm_queries_computername: Retrieves the computer name
T1134 sets_privilegies_via_rtladjustprivilege: Sets process privilege via RtlAdjustPrivilege
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Credential Access
T1552.001 infostealer_bitcoin: Attempts to obtain access to Bitcoin/ALTCoin wallets
Discovery
T1057 has_wmi: Executes one or several WMI requests
T1497.001 antivm_disk_size: Checks the amount of free disk space
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
T1057 process_interest: Enumerates processes
T1082 reads_csrss: Attempts to read csrss.exe memory
T1497 evasion_diskenum: Sandbox evasion using enumeration of partitions
T1497.001 antivm_queries_computername: Retrieves the computer name
Collection
T1113 screenshot_file: Possibly, makes a screenshot and saves it to a file
Command and Control
T1071.001 winhttp_https: Performs HTTP/HTTPS requests using WinHttp
Impact
T1486 modifies_files2: Cryptolocker indicators detected (100 or more files are modified)
T1486 modifies_files: Cryptolocker indicators detected (renamed 100 or more files)
T1489 stops_service: Stops Windows services
T1490 vssadmin_delete_shadows: Attempt to delete volume shadow copies
T1486 ransomware_files: Ransomware indicators detected REvil (creates keys and the instruction on how to unlock the files)
T1489 service_control_stop: Stops services via ControlService
Other
yara_rules: Static rules
ce_info: REvil note, REvil config Configuration Data found
revil: Ransomware REvil indicators detected
creates_exe: Creates executable files in the file system
executes_dropped_exe: Executes dropped exe files
modifies_certs: Attempts to generate or modify system certificates
cryptolocker_wallpaper: Ransomware indicators detected (changes the desktop wallpaper file)
dns_without_resolve: DNS query without a response
dead_host: Connects to IP addresses that do not respond to requests
unexpected_exception: Unexpected exception
create_rpc_bindings: Creates RPC connection
break_limit_exceeded: Warning: function calls limit has been exceeded
test_check_service: Starts services
writes_data: Writes big amount of data to disk
Managed XDR