Analysis
-
max time kernel
39s -
max time network
26s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/11/2024, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
Atlantis.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Atlantis.exe
Resource
win10v2004-20241007-en
General
-
Target
Atlantis.exe
-
Size
11.3MB
-
MD5
54e52e26d0fcde918064a2bbb22349f7
-
SHA1
dbdbbb5b56bd96b11fa2858e53cd54f20f2aabd2
-
SHA256
6468075f54f979aa46a54bc0616117c552d7a3e32f6dcb93b910647ff59e97a2
-
SHA512
c09308e75c1b7fcfe9931ba16c4eb1de6ae6e9fa0f3d982c2a303c9a5920a0193a04b8aef12b67ee11cf5750c5f040e297c6190411d5a75fca628835e1b03ee3
-
SSDEEP
98304:EaDTGUBeqiZv3ubvSxOS9CCKLBscvPuxuXTpRpN0pEV5ctEVdX5xLeTydFjFs7gP:EGTNev3uUcrzvpXK7gFO2b
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 276 rundll32.exe 7 276 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2608 2524 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Atlantis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\OOBGameInstalled = "1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\ServiceLocation rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2524 wrote to memory of 276 2524 Atlantis.exe 30 PID 2524 wrote to memory of 276 2524 Atlantis.exe 30 PID 2524 wrote to memory of 276 2524 Atlantis.exe 30 PID 2524 wrote to memory of 276 2524 Atlantis.exe 30 PID 2524 wrote to memory of 276 2524 Atlantis.exe 30 PID 2524 wrote to memory of 276 2524 Atlantis.exe 30 PID 2524 wrote to memory of 276 2524 Atlantis.exe 30 PID 2524 wrote to memory of 2608 2524 Atlantis.exe 32 PID 2524 wrote to memory of 2608 2524 Atlantis.exe 32 PID 2524 wrote to memory of 2608 2524 Atlantis.exe 32 PID 2524 wrote to memory of 2608 2524 Atlantis.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Atlantis.exe"C:\Users\Admin\AppData\Local\Temp\Atlantis.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\gameux.dll,GameUXShim {0ec4a233-e49b-47dc-9883-c26cebaffaaf};C:\Users\Admin\AppData\Local\Temp\Atlantis.exe;25242⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 10042⤵
- Program crash
PID:2608
-