Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

18/10/2024, 00:32

241018-avtvesybqp 10

18/10/2024, 00:24

241018-ap6xssveqg 10

Analysis

  • max time kernel
    19s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2024, 00:24

General

  • Target

    Xeno-Executor-v1.0.8-main.zip

  • Size

    4.1MB

  • MD5

    5f092e0d074a1a45f22db0bd55c0931f

  • SHA1

    9294aa768de3f0ef8a6468854e2d118c5a72d6fe

  • SHA256

    5f6b7fac414c602989c14283e4bfd01a9dad04d84d178a4fd108d1e5d133eaf4

  • SHA512

    346eae473dadbd7f05743ea02a49fc4c1fd7a92d8b7e09fa8f8291a5ddf3619e6c0ab1196e4d46a930e54c110abf461966fbf4dae5fff1cf6dfd756b46d2a0a0

  • SSDEEP

    98304:4FP5+BAtOValm08CkdzmbjjgAPd1fJ+BOxbaYZ01dvpbN8:4L+B6O8lmNC4SbjjgM1fJ+S1UlS

Score
10/10

Malware Config

Extracted

Family

xworm

C2

like-minute.gl.at.ply.gg:57419

Attributes
  • Install_directory

    %AppData%

  • install_file

    antivirus.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Executes dropped EXE 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Xeno-Executor-v1.0.8-main.zip"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Users\Admin\AppData\Local\Temp\7zO4E83C3A6\Xeno.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO4E83C3A6\Xeno.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1792

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zO4E83C3A6\Xeno.exe

    Filesize

    53KB

    MD5

    f181bd676c27c82a9041018a1b31cc34

    SHA1

    e5e146d152b5e0e1f533e99693d3226000a68816

    SHA256

    20919e71c5aa9728b8dbd5475b0efabf3a7aa730be17151a9bb2dd21fa1e1dce

    SHA512

    e7b089deb4d23087226f2d5377931466acded58e82f67f7a8bc8e0a20e5bf135c8ea7fce117fb0353357b0a08c3f474a906fe7774d65f9da720de3b19013451e

  • memory/1792-11-0x0000000000950000-0x0000000000964000-memory.dmp

    Filesize

    80KB