Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
19s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 00:24
General
-
Target
Xeno-Executor-v1.0.8-main.zip
-
Size
4.1MB
-
MD5
5f092e0d074a1a45f22db0bd55c0931f
-
SHA1
9294aa768de3f0ef8a6468854e2d118c5a72d6fe
-
SHA256
5f6b7fac414c602989c14283e4bfd01a9dad04d84d178a4fd108d1e5d133eaf4
-
SHA512
346eae473dadbd7f05743ea02a49fc4c1fd7a92d8b7e09fa8f8291a5ddf3619e6c0ab1196e4d46a930e54c110abf461966fbf4dae5fff1cf6dfd756b46d2a0a0
-
SSDEEP
98304:4FP5+BAtOValm08CkdzmbjjgAPd1fJ+BOxbaYZ01dvpbN8:4L+B6O8lmNC4SbjjgM1fJ+S1UlS
Malware Config
Extracted
xworm
like-minute.gl.at.ply.gg:57419
-
Install_directory
%AppData%
-
install_file
antivirus.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x00090000000162e4-4.dat family_xworm behavioral1/memory/1792-11-0x0000000000950000-0x0000000000964000-memory.dmp family_xworm -
Executes dropped EXE 1 IoCs
pid Process 1792 Xeno.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2276 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2276 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2276 7zFM.exe Token: 35 2276 7zFM.exe Token: SeSecurityPrivilege 2276 7zFM.exe Token: SeDebugPrivilege 1792 Xeno.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2276 7zFM.exe 2276 7zFM.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1792 2276 7zFM.exe 28 PID 2276 wrote to memory of 1792 2276 7zFM.exe 28 PID 2276 wrote to memory of 1792 2276 7zFM.exe 28
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Xeno-Executor-v1.0.8-main.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\7zO4E83C3A6\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\7zO4E83C3A6\Xeno.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1792
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5f181bd676c27c82a9041018a1b31cc34
SHA1e5e146d152b5e0e1f533e99693d3226000a68816
SHA25620919e71c5aa9728b8dbd5475b0efabf3a7aa730be17151a9bb2dd21fa1e1dce
SHA512e7b089deb4d23087226f2d5377931466acded58e82f67f7a8bc8e0a20e5bf135c8ea7fce117fb0353357b0a08c3f474a906fe7774d65f9da720de3b19013451e