A ransomware attack encrypted multiple employee machines at a client organisation. Affected users reported ransom notes on their desktops and changed desktop backgrounds. Using Splunk SIEM containing Sysmon event logs from one of the encrypted machines, this investigation traces the full attack chain — from initial execution through shadow copy deletion to attacker C2 infrastructure identification.
Sysmon Event ID 11 (FileCreate) logs file creation activity. Searching for readme file creation events reveals the ransom note dropped by the ransomware:
bash
index=revil "event.code"=11 "readme"

This single query surfaces the majority of the initial investigation data — the ransom note filename, the process responsible, and the executable path.
Ransom note filename: 5uizv5660t-readme.txt Process ID: 5348 Ransomware executable: C:\Users\Administrator\Downloads\facebook assistant.exe
A key ransomware behaviour is destroying Volume Shadow Copies to prevent system recovery. Checking Event ID 26 (file delete) returned only one result — not the shadow copy deletion. Pivoting to PowerShell execution via Event ID 1:
index=revil powershell.exe "event.code"=1

The results revealed an obfuscated PowerShell command using Base64 encoding:
powershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAAR...
Decoding the Base64 string reveals the shadow copy deletion command:
Decoded: Get-WmiObject Win32_Shadowcopy | ForEach-Object {$_.Delete();}
Classic ransomware anti-recovery technique — wiping all VSS snapshots before or during encryption to prevent the victim from restoring files without paying.
Extracting the hash of the ransomware executable from Sysmon process creation logs:
index=revil event.code=1 "facebook assistant.exe" | table winlog.event_data.Hashes
The Hashes field returned all hash types logged by Sysmon:
SHA1=E5D8D5EECF7957996485CBC1CDBEAD9221672A1A
MD5=4D84641B65D8BB6C3EF03BF59434242D
SHA256=B8D7FB4488C0556385498271AB9FFFDF0EB38BB2A330265D9852E3A6288092AA
IMPHASH=C686E5B9F7A178EB79F1CF16460B6A18
SHA256: B8D7FB4488C0556385498271AB9FFFDF0EB38BB2A330265D9852E3A6288092AA
VirusTotal confirms the hash as a known REvil (Sodinokibi) ransomware sample — attributed to the GOLD SOUTHFIELD threat actor group.

Cross-referencing the SHA256 hash against threat intelligence sources including tria.ge (hxxps://tria[.]ge/260212-qazsyabv9d) and the ransom note content identified the attacker’s Tor-based communication channel:
Onion domain: aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd[.]onion

This domain is the victim portal used by REvil to negotiate ransom payments and deliver decryption keys.
| Type | Value |
|---|---|
| Filename | facebook assistant.exe |
| Filename | 5uizv5660t-readme.txt |
| SHA256 | B8D7FB4488C0556385498271AB9FFFDF0EB38BB2A330265D9852E3A6288092AA |
| MD5 | 4D84641B65D8BB6C3EF03BF59434242D |
| SHA1 | E5D8D5EECF7957996485CBC1CDBEAD9221672A1A |
| Onion | aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd[.]onion |
| Path | C:\Users\Administrator\Downloads\facebook assistant.exe |
| Technique | ID |
|---|---|
| User Execution: Malicious File | T1204.002 |
| Inhibit System Recovery | T1490 |
| Command and Scripting Interpreter: PowerShell | T1059.001 |
| Obfuscated Files or Information: Command Obfuscation | T1027.010 |
| Data Encrypted for Impact | T1486 |
The lab demonstrates that Sysmon Event ID 11 is a powerful starting point for ransomware investigations — file creation events tie the ransom note directly to the responsible process and executable path with a single query. The obfuscated Base64 PowerShell command is a textbook technique; any -e or -EncodedCommand flag in PowerShell execution logs should be treated as suspicious and decoded immediately. Sysmon’s hash logging in Event ID 1 is invaluable — a single query surfaces SHA256, MD5, SHA1, and IMPHASH simultaneously, enabling immediate threat intel cross-referencing without needing endpoint access.
I successfully completed REvil - GOLD SOUTHFIELD Blue Team Lab at @CyberDefenders! https://cyberdefenders.org/blueteam-ctf-challenges/achievements/inksec/revil-gold-southfield/
#CyberDefenders #CyberSecurity #BlueYard #BlueTeam #InfoSec #SOC #SOCAnalyst #DFIR #CCD #CyberDefender