Analysis

  • max time kernel
    106s
  • max time network
    120s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    17-12-2024 18:37

General

  • Target

    XtasyExecutor.exe

  • Size

    202KB

  • MD5

    20bd0480bb862bd1d073477a87aede81

  • SHA1

    3c7c72fc3c1bec023386ac6ed14ad5cb785fe4ce

  • SHA256

    548529c38438f4a9aea915448e183f24d4ddbe793a86090075775a154d59f067

  • SHA512

    6b4817a7921bb62bbaf6835a3948a1811914f652f5f6ad86fe0b52376b6347d180488c3de4f02ba8ec962c45c5b4d6ad91eba11441989bbb42dab2863dfaa766

  • SSDEEP

    6144:gLV6Bta6dtJmakIM5E/hBp4OnvF3ZO2hdi:gLV6BtpmkJBprnvF3AWi

Malware Config

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Nanocore family
  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XtasyExecutor.exe
    "C:\Users\Admin\AppData\Local\Temp\XtasyExecutor.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4160
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k UnistackSvcGroup
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1120
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy
    1⤵
      PID:5868
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:5396
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:5592
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x4 /state0:0xa3a17855 /state1:0x41c64e6d
        1⤵
          PID:4796

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat

          Filesize

          13KB

          MD5

          9a49f0db33711cb9e03a392a8cad7240

          SHA1

          24b826e097870551ae8b1cf13dcac5921af846dc

          SHA256

          c3accd710ccbdf5266a981dcef1e895990ea3309967410e4937314deac75ede1

          SHA512

          e48f729a174756433d92df4f5d999af8169a1dae8c50847039167dd624df2f173fc06d7424128b5debd56156f84dcedfad01fde555b7b18551b87a3b069f44d5

        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\~tartUnifiedTileModelCache.tmp

          Filesize

          16KB

          MD5

          8d2b31c2b563b5fef4392efe63ff65f9

          SHA1

          ae8aefa6e7dbf4983359366d3fd557d4977cb54f

          SHA256

          5457750a9210d8be728d1cc07496d4c6990d150f18a10e2135939d9215c86645

          SHA512

          fa599fc89dcee174333b94ddcaeca1b42d333e606d9ae523ed1a972e5241cecb01b0cc1e640e460f2449126a5a04eb1d5726c63736cdecfd84bb69702c8dafdc

        • memory/1120-67-0x000002C56DFD0000-0x000002C56DFD1000-memory.dmp

          Filesize

          4KB

        • memory/1120-79-0x000002C56DFD0000-0x000002C56DFD1000-memory.dmp

          Filesize

          4KB

        • memory/1120-84-0x000002C56F770000-0x000002C56F771000-memory.dmp

          Filesize

          4KB

        • memory/1120-68-0x000002C56DFD0000-0x000002C56DFD1000-memory.dmp

          Filesize

          4KB

        • memory/1120-83-0x000002C56F770000-0x000002C56F771000-memory.dmp

          Filesize

          4KB

        • memory/1120-81-0x000002C56DFE0000-0x000002C56DFE1000-memory.dmp

          Filesize

          4KB

        • memory/1120-82-0x000002C56DFF0000-0x000002C56DFF1000-memory.dmp

          Filesize

          4KB

        • memory/1120-19-0x000002C565B40000-0x000002C565B50000-memory.dmp

          Filesize

          64KB

        • memory/1120-36-0x000002C565C50000-0x000002C565C60000-memory.dmp

          Filesize

          64KB

        • memory/1120-54-0x000002C56DE60000-0x000002C56DE61000-memory.dmp

          Filesize

          4KB

        • memory/1120-80-0x000002C56DFE0000-0x000002C56DFE1000-memory.dmp

          Filesize

          4KB

        • memory/1120-59-0x000002C56DFB0000-0x000002C56DFB1000-memory.dmp

          Filesize

          4KB

        • memory/1120-69-0x000002C56DFD0000-0x000002C56DFD1000-memory.dmp

          Filesize

          4KB

        • memory/1120-60-0x000002C56DFB0000-0x000002C56DFB1000-memory.dmp

          Filesize

          4KB

        • memory/1120-61-0x000002C56DFB0000-0x000002C56DFB1000-memory.dmp

          Filesize

          4KB

        • memory/1120-62-0x000002C56DFD0000-0x000002C56DFD1000-memory.dmp

          Filesize

          4KB

        • memory/1120-63-0x000002C56DFD0000-0x000002C56DFD1000-memory.dmp

          Filesize

          4KB

        • memory/1120-64-0x000002C56DFD0000-0x000002C56DFD1000-memory.dmp

          Filesize

          4KB

        • memory/1120-65-0x000002C56DFD0000-0x000002C56DFD1000-memory.dmp

          Filesize

          4KB

        • memory/1120-66-0x000002C56DFD0000-0x000002C56DFD1000-memory.dmp

          Filesize

          4KB

        • memory/1120-56-0x000002C56DFA0000-0x000002C56DFA1000-memory.dmp

          Filesize

          4KB

        • memory/1120-78-0x000002C56DFD0000-0x000002C56DFD1000-memory.dmp

          Filesize

          4KB

        • memory/1120-58-0x000002C56DFA0000-0x000002C56DFA1000-memory.dmp

          Filesize

          4KB

        • memory/1120-71-0x000002C56DFD0000-0x000002C56DFD1000-memory.dmp

          Filesize

          4KB

        • memory/1120-70-0x000002C56DFD0000-0x000002C56DFD1000-memory.dmp

          Filesize

          4KB

        • memory/1120-72-0x000002C56DFD0000-0x000002C56DFD1000-memory.dmp

          Filesize

          4KB

        • memory/1120-73-0x000002C56DFD0000-0x000002C56DFD1000-memory.dmp

          Filesize

          4KB

        • memory/1120-75-0x000002C56DFD0000-0x000002C56DFD1000-memory.dmp

          Filesize

          4KB

        • memory/1120-74-0x000002C56DFD0000-0x000002C56DFD1000-memory.dmp

          Filesize

          4KB

        • memory/1120-77-0x000002C56DFD0000-0x000002C56DFD1000-memory.dmp

          Filesize

          4KB

        • memory/1120-76-0x000002C56DFD0000-0x000002C56DFD1000-memory.dmp

          Filesize

          4KB

        • memory/2728-11-0x0000000075190000-0x0000000075741000-memory.dmp

          Filesize

          5.7MB

        • memory/2728-10-0x0000000075190000-0x0000000075741000-memory.dmp

          Filesize

          5.7MB

        • memory/2728-0-0x0000000075191000-0x0000000075192000-memory.dmp

          Filesize

          4KB

        • memory/2728-18-0x0000000075190000-0x0000000075741000-memory.dmp

          Filesize

          5.7MB

        • memory/2728-17-0x0000000075190000-0x0000000075741000-memory.dmp

          Filesize

          5.7MB

        • memory/2728-5-0x0000000075190000-0x0000000075741000-memory.dmp

          Filesize

          5.7MB

        • memory/2728-9-0x0000000075190000-0x0000000075741000-memory.dmp

          Filesize

          5.7MB

        • memory/2728-2-0x0000000075190000-0x0000000075741000-memory.dmp

          Filesize

          5.7MB

        • memory/2728-1-0x0000000075190000-0x0000000075741000-memory.dmp

          Filesize

          5.7MB

        • memory/2728-164-0x0000000075190000-0x0000000075741000-memory.dmp

          Filesize

          5.7MB

        • memory/5396-95-0x0000020CDAF40000-0x0000020CDAF41000-memory.dmp

          Filesize

          4KB

        • memory/5396-93-0x0000020CDAF40000-0x0000020CDAF41000-memory.dmp

          Filesize

          4KB

        • memory/5396-94-0x0000020CDAF40000-0x0000020CDAF41000-memory.dmp

          Filesize

          4KB