Analysis
-
max time kernel
2s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2024 19:33
Static task
static1
Behavioral task
behavioral1
Sample
49474e054b5435c7b8c9132866e57b1a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
49474e054b5435c7b8c9132866e57b1a.exe
Resource
win10v2004-20231222-en
General
-
Target
49474e054b5435c7b8c9132866e57b1a.exe
-
Size
263KB
-
MD5
49474e054b5435c7b8c9132866e57b1a
-
SHA1
9261b3bda83a9a8e1c888c78fdecca362af9ddb9
-
SHA256
1f756a227c8158b7e51cad1238f8eb2644dee06e2a7fdbabd80ae1c044af4d19
-
SHA512
b9ed58ce3dd573e10c90933ba9ec0c4345754d315f6022899715d6a56e08da4be2abd16fdb51d954b256cef798bc7119c721bde91f3c65f18907f4f3c700b774
-
SSDEEP
6144:vjLOjTZIVuJCRZBkQJFg4ecqo5dqO8IkgHhgRk8QbupCXj7r4n:7LO+MJCKRcJnqOh76/v47En
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 49474e054b5435c7b8c9132866e57b1a.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation atlop.exe -
Executes dropped EXE 2 IoCs
pid Process 4396 atlop.exe 2724 qeazia.exe -
resource yara_rule behavioral2/memory/5996-104-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/4640-135-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/5996-103-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/5996-102-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/5996-99-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1924 4640 WerFault.exe 101 -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 5832 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4396 atlop.exe 4396 atlop.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4396 atlop.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4836 wrote to memory of 4396 4836 49474e054b5435c7b8c9132866e57b1a.exe 88 PID 4836 wrote to memory of 4396 4836 49474e054b5435c7b8c9132866e57b1a.exe 88 PID 4836 wrote to memory of 4396 4836 49474e054b5435c7b8c9132866e57b1a.exe 88 PID 4396 wrote to memory of 2724 4396 atlop.exe 100 PID 4396 wrote to memory of 2724 4396 atlop.exe 100 PID 4396 wrote to memory of 2724 4396 atlop.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\49474e054b5435c7b8c9132866e57b1a.exe"C:\Users\Admin\AppData\Local\Temp\49474e054b5435c7b8c9132866e57b1a.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\atlop.exe"C:\Users\Admin\atlop.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del atlop.exe3⤵PID:6012
-
-
C:\Users\Admin\qeazia.exe"C:\Users\Admin\qeazia.exe"3⤵
- Executes dropped EXE
PID:2724
-
-
-
C:\Users\Admin\btlop.exe"C:\Users\Admin\btlop.exe"2⤵PID:3016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\a.bat" "3⤵PID:1696
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"3⤵PID:5996
-
-
-
C:\Users\Admin\ctlop.exe"C:\Users\Admin\ctlop.exe"2⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 7483⤵
- Program crash
PID:1924
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZSfx000.cmd" "2⤵PID:388
-
-
C:\Windows\SysWOW64\tasklist.exetasklist1⤵
- Enumerates processes with tasklist
PID:5832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4640 -ip 46401⤵PID:5556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD599729f5cc9cd62f9f791ba171f77f827
SHA161490b05da4b10fc501df296f56f80b9571c16c7
SHA256e5f5259e5a26c28891023d8adf44b3971486e8989363f902ae2977eefbd18c40
SHA5121e9b3d3f8694e0119858d92cdcf5ae3aa1da9c425c0f6ff2a6856d68b0ceff4f221eb8c5d67f4abd57fbcdc545b2aeea172e20ccfc1d6e9264751843a505164a