Analysis
-
max time kernel
1047s -
max time network
908s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
02/03/2025, 17:03
Behavioral task
behavioral1
Sample
ratka.exe
Resource
win10ltsc2021-20250217-en
General
-
Target
ratka.exe
-
Size
80KB
-
MD5
39ffa7b287f2d822703a6deea560dcbd
-
SHA1
34ae6406ec73ad02955cb7676b37489fdab1695b
-
SHA256
9465f48edb12c0ecfe182d5d6a91be86afd52c152b61c3916efb09df3a90cb05
-
SHA512
7efa49f3c9ba846d6382e7683d64a5b00232c459028a177b07c0e4f28f06682bd3a219421a355515766007bee9e0dfcce5e243afba73290487057542a644cc40
-
SSDEEP
1536:GeKbbG1+cDVWr5hLbwWV5hcEW07Z4E+bCXsEN9qtgq6rLs4ORpmcG1h:GeKbb60r5hLbwWVcPk1+b8JY4ORpmth
Malware Config
Extracted
xworm
cause-indexes.gl.at.ply.gg:17210
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1904-1-0x0000000000500000-0x000000000051A000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3532 powershell.exe 456 powershell.exe 1332 powershell.exe 1124 powershell.exe -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983685854-559653692-675906587-1000\Control Panel\International\Geo\Nation ratka.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk ratka.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk ratka.exe -
Executes dropped EXE 1 IoCs
pid Process 4740 tnxdsj.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983685854-559653692-675906587-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" ratka.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 tnxdsj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnxdsj.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4116 reg.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3532 powershell.exe 3532 powershell.exe 456 powershell.exe 456 powershell.exe 1332 powershell.exe 1332 powershell.exe 1124 powershell.exe 1124 powershell.exe 1904 ratka.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1904 ratka.exe Token: SeDebugPrivilege 3532 powershell.exe Token: SeIncreaseQuotaPrivilege 3532 powershell.exe Token: SeSecurityPrivilege 3532 powershell.exe Token: SeTakeOwnershipPrivilege 3532 powershell.exe Token: SeLoadDriverPrivilege 3532 powershell.exe Token: SeSystemProfilePrivilege 3532 powershell.exe Token: SeSystemtimePrivilege 3532 powershell.exe Token: SeProfSingleProcessPrivilege 3532 powershell.exe Token: SeIncBasePriorityPrivilege 3532 powershell.exe Token: SeCreatePagefilePrivilege 3532 powershell.exe Token: SeBackupPrivilege 3532 powershell.exe Token: SeRestorePrivilege 3532 powershell.exe Token: SeShutdownPrivilege 3532 powershell.exe Token: SeDebugPrivilege 3532 powershell.exe Token: SeSystemEnvironmentPrivilege 3532 powershell.exe Token: SeRemoteShutdownPrivilege 3532 powershell.exe Token: SeUndockPrivilege 3532 powershell.exe Token: SeManageVolumePrivilege 3532 powershell.exe Token: 33 3532 powershell.exe Token: 34 3532 powershell.exe Token: 35 3532 powershell.exe Token: 36 3532 powershell.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeIncreaseQuotaPrivilege 456 powershell.exe Token: SeSecurityPrivilege 456 powershell.exe Token: SeTakeOwnershipPrivilege 456 powershell.exe Token: SeLoadDriverPrivilege 456 powershell.exe Token: SeSystemProfilePrivilege 456 powershell.exe Token: SeSystemtimePrivilege 456 powershell.exe Token: SeProfSingleProcessPrivilege 456 powershell.exe Token: SeIncBasePriorityPrivilege 456 powershell.exe Token: SeCreatePagefilePrivilege 456 powershell.exe Token: SeBackupPrivilege 456 powershell.exe Token: SeRestorePrivilege 456 powershell.exe Token: SeShutdownPrivilege 456 powershell.exe Token: SeDebugPrivilege 456 powershell.exe Token: SeSystemEnvironmentPrivilege 456 powershell.exe Token: SeRemoteShutdownPrivilege 456 powershell.exe Token: SeUndockPrivilege 456 powershell.exe Token: SeManageVolumePrivilege 456 powershell.exe Token: 33 456 powershell.exe Token: 34 456 powershell.exe Token: 35 456 powershell.exe Token: 36 456 powershell.exe Token: SeDebugPrivilege 1332 powershell.exe Token: SeIncreaseQuotaPrivilege 1332 powershell.exe Token: SeSecurityPrivilege 1332 powershell.exe Token: SeTakeOwnershipPrivilege 1332 powershell.exe Token: SeLoadDriverPrivilege 1332 powershell.exe Token: SeSystemProfilePrivilege 1332 powershell.exe Token: SeSystemtimePrivilege 1332 powershell.exe Token: SeProfSingleProcessPrivilege 1332 powershell.exe Token: SeIncBasePriorityPrivilege 1332 powershell.exe Token: SeCreatePagefilePrivilege 1332 powershell.exe Token: SeBackupPrivilege 1332 powershell.exe Token: SeRestorePrivilege 1332 powershell.exe Token: SeShutdownPrivilege 1332 powershell.exe Token: SeDebugPrivilege 1332 powershell.exe Token: SeSystemEnvironmentPrivilege 1332 powershell.exe Token: SeRemoteShutdownPrivilege 1332 powershell.exe Token: SeUndockPrivilege 1332 powershell.exe Token: SeManageVolumePrivilege 1332 powershell.exe Token: 33 1332 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1904 ratka.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1904 wrote to memory of 3532 1904 ratka.exe 84 PID 1904 wrote to memory of 3532 1904 ratka.exe 84 PID 1904 wrote to memory of 456 1904 ratka.exe 90 PID 1904 wrote to memory of 456 1904 ratka.exe 90 PID 1904 wrote to memory of 1332 1904 ratka.exe 92 PID 1904 wrote to memory of 1332 1904 ratka.exe 92 PID 1904 wrote to memory of 1124 1904 ratka.exe 94 PID 1904 wrote to memory of 1124 1904 ratka.exe 94 PID 1904 wrote to memory of 4740 1904 ratka.exe 103 PID 1904 wrote to memory of 4740 1904 ratka.exe 103 PID 1904 wrote to memory of 4740 1904 ratka.exe 103 PID 4740 wrote to memory of 3396 4740 tnxdsj.exe 104 PID 4740 wrote to memory of 3396 4740 tnxdsj.exe 104 PID 4740 wrote to memory of 3396 4740 tnxdsj.exe 104 PID 3396 wrote to memory of 4116 3396 cmd.exe 106 PID 3396 wrote to memory of 4116 3396 cmd.exe 106 PID 3396 wrote to memory of 4116 3396 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\ratka.exe"C:\Users\Admin\AppData\Local\Temp\ratka.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\ratka.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'ratka.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1124
-
-
C:\Users\Admin\AppData\Local\Temp\tnxdsj.exe"C:\Users\Admin\AppData\Local\Temp\tnxdsj.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c REG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\reg.exeREG ADD hkcu\Software\Microsoft\Windows\CurrentVersion\policies\system /v DisableTaskMgr /t reg_dword /d 1 /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4116
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x50c 0x5041⤵PID:2932
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD560b3262c3163ee3d466199160b9ed07d
SHA1994ece4ea4e61de0be2fdd580f87e3415f9e1ff6
SHA256e3b30f16d41f94cba2b8a75f35c91ae7418465abfbfe5477ec0551d1952b2fdb
SHA512081d2015cb94477eb0fbc38f44b6d9b4a3204fb3ad0b7d0e146a88ab4ab9a0d475207f1adae03f4a81ccc5beb7568dc8be1249f69e32fe56efd9ee2f6ee3b1af
-
Filesize
1KB
MD5c238412481a146ab11982ee82490777c
SHA161451087cbd22daf63c18b6c3c939fe0952f27c3
SHA25625f1c3a4b36ae44eb159193c17cc953ae3fa576928f2384865ab837a964bd9f2
SHA5124ee702b05336364af8cb89a6dd162b9404a8307c5fef96b7af82e8db55459b65b0ce1ce6f6e3018aa213a73f42ba5dc80d8550e45baf756ef0b8b8459e7f9f9b
-
Filesize
1KB
MD5d107add3b43194a9c5aa94a664139b0e
SHA1611be48fb978b9c8becfeae1b544fd7a6a3b70c5
SHA2563c34a437d16805b6a658b61bcba4a3ee1d415348f03de0614a2c9a2b43e6b85c
SHA5125a3f317ab6baa429084d09a357f8a81d2b045d35bb820ce670f5645877677c315a3739a90af8c2c273c17c730c9d99695d16ac95a981f8649299f756dd840500
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
63KB
MD52cf51977ed60a9a59d29a72075ce52ad
SHA1960e40eaa8445c0049d11f97abba7f4b465ad4d5
SHA25664735679e70b0d6e67198c28df11cf449dc114df01f6c336d61a9da39448f853
SHA512bfcad9e99ff0dfd2cd917b8160cccab3710ed9974a6c15ea7dd1b0db965a51eec5ac588a87c4bab37af60504a3deb4f11de0a4d93a0c3648673b0dc0824646ad