Analysis
-
max time kernel
106s -
max time network
120s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-12-2024 18:37
Behavioral task
behavioral1
Sample
XtasyExecutor.exe
Resource
win11-20241007-en
General
-
Target
XtasyExecutor.exe
-
Size
202KB
-
MD5
20bd0480bb862bd1d073477a87aede81
-
SHA1
3c7c72fc3c1bec023386ac6ed14ad5cb785fe4ce
-
SHA256
548529c38438f4a9aea915448e183f24d4ddbe793a86090075775a154d59f067
-
SHA512
6b4817a7921bb62bbaf6835a3948a1811914f652f5f6ad86fe0b52376b6347d180488c3de4f02ba8ec962c45c5b4d6ad91eba11441989bbb42dab2863dfaa766
-
SSDEEP
6144:gLV6Bta6dtJmakIM5E/hBp4OnvF3ZO2hdi:gLV6BtpmkJBprnvF3AWi
Malware Config
Signatures
-
Nanocore family
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WAN Host = "C:\\Program Files (x86)\\WAN Host\\wanhost.exe" XtasyExecutor.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA XtasyExecutor.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\WAN Host\wanhost.exe XtasyExecutor.exe File opened for modification C:\Program Files (x86)\WAN Host\wanhost.exe XtasyExecutor.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\ XtasyExecutor.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XtasyExecutor.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe 2728 XtasyExecutor.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2728 XtasyExecutor.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2728 XtasyExecutor.exe Token: SeManageVolumePrivilege 1120 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5396 StartMenuExperienceHost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2728 wrote to memory of 4160 2728 XtasyExecutor.exe 77 PID 2728 wrote to memory of 4160 2728 XtasyExecutor.exe 77 PID 2728 wrote to memory of 4160 2728 XtasyExecutor.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\XtasyExecutor.exe"C:\Users\Admin\AppData\Local\Temp\XtasyExecutor.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4160
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy1⤵PID:5868
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5396
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5592
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a17855 /state1:0x41c64e6d1⤵PID:4796
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize13KB
MD59a49f0db33711cb9e03a392a8cad7240
SHA124b826e097870551ae8b1cf13dcac5921af846dc
SHA256c3accd710ccbdf5266a981dcef1e895990ea3309967410e4937314deac75ede1
SHA512e48f729a174756433d92df4f5d999af8169a1dae8c50847039167dd624df2f173fc06d7424128b5debd56156f84dcedfad01fde555b7b18551b87a3b069f44d5
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\~tartUnifiedTileModelCache.tmp
Filesize16KB
MD58d2b31c2b563b5fef4392efe63ff65f9
SHA1ae8aefa6e7dbf4983359366d3fd557d4977cb54f
SHA2565457750a9210d8be728d1cc07496d4c6990d150f18a10e2135939d9215c86645
SHA512fa599fc89dcee174333b94ddcaeca1b42d333e606d9ae523ed1a972e5241cecb01b0cc1e640e460f2449126a5a04eb1d5726c63736cdecfd84bb69702c8dafdc