Overview
overview
10Static
static
7Executable...ce.url
windows10-2004-x64
1Executable...rd.url
windows10-2004-x64
1Executable...on.url
windows10-2004-x64
1Executable...um.url
windows10-2004-x64
1Executable...ub.url
windows10-2004-x64
1Executable...te.url
windows10-2004-x64
1Executable...e).url
windows10-2004-x64
1Executable...ub.url
windows10-2004-x64
1Executable...er.cmd
windows10-2004-x64
10Executable...TI.cmd
windows10-2004-x64
1Executable...vc.cmd
windows10-2004-x64
10Executable...ev.cmd
windows10-2004-x64
10Executable...er.exe
windows10-2004-x64
3Executable...ce.exe
windows10-2004-x64
7Executable...P1.cmd
windows10-2004-x64
1Executable...P2.cmd
windows10-2004-x64
1Executable...RS.cmd
windows10-2004-x64
1Executable...OP.cmd
windows10-2004-x64
1Executable...NP.ps1
windows10-2004-x64
1Executables/EDGE.cmd
windows10-2004-x64
1Executable...ZE.cmd
windows10-2004-x64
6Executable...PT.ps1
windows10-2004-x64
1Executables/ONED.cmd
windows10-2004-x64
1Executables/PFP.cmd
windows10-2004-x64
1Executables/POWER.cmd
windows10-2004-x64
1Executable...NU.cmd
windows10-2004-x64
4Executable...TH.cmd
windows10-2004-x64
1Executable...ER.cmd
windows10-2004-x64
4Executable...00.png
windows10-2004-x64
3Executable...rk.png
windows10-2004-x64
3Executable...ht.png
windows10-2004-x64
3playbook.xml
windows10-2004-x64
1Resubmissions
25/04/2023, 20:18
230425-y3j7yscg23 10Analysis
-
max time kernel
468s -
max time network
472s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/04/2023, 20:18
Behavioral task
behavioral1
Sample
Executables/Atlas/4. Troubleshooting/Visual C++ Redistributables/Visual C++ Redistributables AIO Source.url
Resource
win10v2004-20230221-en
Behavioral task
behavioral2
Sample
Executables/Atlas/Atlas Discord.url
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Executables/Atlas/Atlas Documentation.url
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
Executables/Atlas/Atlas Forum.url
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Executables/Atlas/Atlas GitHub.url
Resource
win10v2004-20230220-en
Behavioral task
behavioral6
Sample
Executables/Atlas/Atlas Website.url
Resource
win10v2004-20230221-en
Behavioral task
behavioral7
Sample
Executables/AtlasModules/Acknowledgements/Atlas Utilities (filepicker & multichoice).url
Resource
win10v2004-20230220-en
Behavioral task
behavioral8
Sample
Executables/AtlasModules/Acknowledgements/setSvc GitHub.url
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
Executables/AtlasModules/Scripts/Auto-Cleaner.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
Executables/AtlasModules/Scripts/RunAsTI.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
Executables/AtlasModules/Scripts/setSvc.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral12
Sample
Executables/AtlasModules/Scripts/toggleDev.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
Executables/AtlasModules/Tools/filepicker.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral14
Sample
Executables/AtlasModules/Tools/multichoice.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
Executables/BACKUP1.cmd
Resource
win10v2004-20230221-en
Behavioral task
behavioral16
Sample
Executables/BACKUP2.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
Executables/CONVERTUSERS.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral18
Sample
Executables/COPYDESKTOP.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
Executables/DISABLEPNP.ps1
Resource
win10v2004-20230220-en
Behavioral task
behavioral20
Sample
Executables/EDGE.cmd
Resource
win10v2004-20230221-en
Behavioral task
behavioral21
Sample
Executables/FINALIZE.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral22
Sample
Executables/MITIGATIONPROMPT.ps1
Resource
win10v2004-20230221-en
Behavioral task
behavioral23
Sample
Executables/ONED.cmd
Resource
win10v2004-20230221-en
Behavioral task
behavioral24
Sample
Executables/PFP.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
Executables/POWER.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral26
Sample
Executables/STARTMENU.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
Executables/UPDHEALTH.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral28
Sample
Executables/WALLPAPER.cmd
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
Executables/Web/Screen/img100.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral30
Sample
Executables/Web/Wallpaper/Windows/atlas-dark.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral31
Sample
Executables/Web/Wallpaper/Windows/atlas-light.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral32
Sample
playbook.xml
Resource
win10v2004-20230220-en
General
-
Target
Executables/COPYDESKTOP.cmd
-
Size
272B
-
MD5
9f363cdcd66c05de634c0680a8b61a4f
-
SHA1
121f7c9e4de68198d5f13e3f5d17e02eca53fc8b
-
SHA256
05c7b343b863e81283f95a8c83cebce87798b9b9c8fc99f7771496170a96c0c6
-
SHA512
a8dcc8c6f4dcfaf7e6a20adae0a50389dceaf72d62c0ab882e8f1fa92338e25d2dd5881e2b6f267b8a64ca5e9263e5c5061555140098d22d3f8c7a8cda311826
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 3560 Robocopy.exe Token: SeRestorePrivilege 3560 Robocopy.exe Token: SeSecurityPrivilege 3560 Robocopy.exe Token: SeTakeOwnershipPrivilege 3560 Robocopy.exe Token: SeBackupPrivilege 4292 Robocopy.exe Token: SeRestorePrivilege 4292 Robocopy.exe Token: SeSecurityPrivilege 4292 Robocopy.exe Token: SeTakeOwnershipPrivilege 4292 Robocopy.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4412 wrote to memory of 1508 4412 cmd.exe 84 PID 4412 wrote to memory of 1508 4412 cmd.exe 84 PID 1508 wrote to memory of 4664 1508 cmd.exe 85 PID 1508 wrote to memory of 4664 1508 cmd.exe 85 PID 1508 wrote to memory of 4668 1508 cmd.exe 86 PID 1508 wrote to memory of 4668 1508 cmd.exe 86 PID 4412 wrote to memory of 3560 4412 cmd.exe 87 PID 4412 wrote to memory of 3560 4412 cmd.exe 87 PID 4412 wrote to memory of 4292 4412 cmd.exe 89 PID 4412 wrote to memory of 4292 4412 cmd.exe 89
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Executables\COPYDESKTOP.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c dir /b /a:d "C:\Users" | findstr /v /i /x /c:"Public" /c:"Default User" /c:"All Users"2⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" dir /b /a:d "C:\Users" "3⤵PID:4664
-
-
C:\Windows\system32\findstr.exefindstr /v /i /x /c:"Public" /c:"Default User" /c:"All Users"3⤵PID:4668
-
-
-
C:\Windows\system32\Robocopy.exerobocopy "Atlas" "C:\Users\Admin\Desktop\Atlas" /e /purge /im /it /np2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3560
-
-
C:\Windows\system32\Robocopy.exerobocopy "Atlas" "C:\Users\Default\Desktop\Atlas" /e /purge /im /it /np2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Default\Desktop\Atlas\3. Configuration\4. Optional Tweaks\File Explorer Customization\Network Navigation Pane\Run With RunAsTI.lnk
Filesize1KB
MD58047d69f07f9cc85afdbca0293a6af0e
SHA11b3c62746a33d84fba0fb094d57e0632a31869f4
SHA256448292edc5b965daf630a4d2d654e2c2c9df49a009273d0a680be50180fb52c3
SHA51248090617235d44831e00d4efd489da5fccb77bf447382116d801b5f68e9263345759d824e2e58a671c4cf0b61d536f659a1a94100154a5c235f21e416249d7cc