Analysis
-
max time kernel
129s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 13:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-07_72f1329d91d27848cee4f5f6157d8965_mafia_revil.exe
Resource
win7-20240708-en
General
-
Target
2024-09-07_72f1329d91d27848cee4f5f6157d8965_mafia_revil.exe
-
Size
5.0MB
-
MD5
72f1329d91d27848cee4f5f6157d8965
-
SHA1
409a41b98af0f14ff3e347beea00e0afbcb83ef0
-
SHA256
129206afe3923bd775ac814ae13d78bd381e5873ec4f9517afc75a69d5a8cd18
-
SHA512
314234e1bc8f715c8522b7b77606a3e1d5c0b6368ca5859b04f12b4d5c14d80444790a1e9b6b9f990487061f7f55644f6e70e6652de5437f515040b22b67e9d0
-
SSDEEP
98304:DGUog8ijd6uFpQCeGH0WvKODFQAJIC/tQnN+J7:nog8ip4GH0IVFQgIC/7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2744 svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1720 Iquumm.exe -
resource yara_rule behavioral1/memory/2184-6-0x0000000010000000-0x00000000103A6000-memory.dmp upx behavioral1/memory/2184-4-0x0000000010000000-0x00000000103A6000-memory.dmp upx behavioral1/memory/2184-15-0x0000000010000000-0x00000000103A6000-memory.dmp upx behavioral1/memory/2184-1-0x0000000010000000-0x00000000103A6000-memory.dmp upx behavioral1/memory/2184-5-0x0000000010000000-0x00000000103A6000-memory.dmp upx behavioral1/memory/1720-28-0x0000000010000000-0x00000000103A6000-memory.dmp upx behavioral1/memory/2744-45-0x0000000010000000-0x00000000103A6000-memory.dmp upx behavioral1/memory/2184-46-0x0000000010000000-0x00000000103A6000-memory.dmp upx behavioral1/memory/2744-49-0x0000000010000000-0x00000000103A6000-memory.dmp upx behavioral1/memory/2744-48-0x0000000010000000-0x00000000103A6000-memory.dmp upx behavioral1/memory/1720-43-0x0000000010000000-0x00000000103A6000-memory.dmp upx behavioral1/memory/2744-52-0x0000000010000000-0x00000000103A6000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ini.ini 2024-09-07_72f1329d91d27848cee4f5f6157d8965_mafia_revil.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\windows\Iquumm.exe 2024-09-07_72f1329d91d27848cee4f5f6157d8965_mafia_revil.exe File opened for modification C:\windows\Iquumm.exe 2024-09-07_72f1329d91d27848cee4f5f6157d8965_mafia_revil.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iquumm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2744 1720 Iquumm.exe 32 PID 1720 wrote to memory of 2744 1720 Iquumm.exe 32 PID 1720 wrote to memory of 2744 1720 Iquumm.exe 32 PID 1720 wrote to memory of 2744 1720 Iquumm.exe 32 PID 1720 wrote to memory of 2744 1720 Iquumm.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_72f1329d91d27848cee4f5f6157d8965_mafia_revil.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-07_72f1329d91d27848cee4f5f6157d8965_mafia_revil.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:2184
-
C:\windows\Iquumm.exeC:\windows\Iquumm.exe -svc1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -Puppet2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62B
MD5ad634d3d7aedd02d1a4604a46d70f5b5
SHA1a4289d77b79cf3fd3cde83b77dd554bb5af7fa16
SHA256f8000450e662248dbf72426b1c8ce3c30b8cf29eca5b3d545c76de1ed75811f5
SHA51292172c42bfc359ace08c16d92a92e6883c0593d81023ce1d9f29034f53fc3c0ee768e56415b8c1a70410a79d91116e0d1fd7cf316cee42353ae18cffd528dfad
-
Filesize
106B
MD5c922efffdb67dc51e04a21b1ac6dd00d
SHA1c506f9f86cf78b78a3ba7e425f6bfd1e524bec6b
SHA2562ff1c13878d938dac4abf7c9700ab193fa9ee4476dcd6a47e2c0786a21f3b6db
SHA512108acbc9c6c74665e20c24063fb5e2b9b7bff07c8f86fd2cf39b4fd7bb2130d90a23de38607acc539c3e201f8ccb2dbe988a2a973288a79115a29e8e2744db78
-
Filesize
260B
MD5efb6fefd3c4bb56ed573b2705b316e1b
SHA1a08b42e4382c29440ad91698ff7fee77ceb78682
SHA25695560c0a718a241ef6afbb21e5f87804fb0c6352ed535c50740adf32a0088f7a
SHA512cf8579734774b32c67b21590f10e0e997fbb2886bdf9cc33b5a7cd9080c2473c73540f698d1f2f09c70fbe70ddfa1844464f57fb4b36f1a947eb2e13d307065d
-
Filesize
5.0MB
MD572f1329d91d27848cee4f5f6157d8965
SHA1409a41b98af0f14ff3e347beea00e0afbcb83ef0
SHA256129206afe3923bd775ac814ae13d78bd381e5873ec4f9517afc75a69d5a8cd18
SHA512314234e1bc8f715c8522b7b77606a3e1d5c0b6368ca5859b04f12b4d5c14d80444790a1e9b6b9f990487061f7f55644f6e70e6652de5437f515040b22b67e9d0