Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10Xeno-Execu...in.zip
windows10-2004-x64
10Xeno-Execu...re.dll
windows10-2004-x64
1Xeno-Execu...ms.dll
windows10-2004-x64
1Xeno-Execu...pf.dll
windows10-2004-x64
1Xeno-Execu...DME.md
windows10-2004-x64
3Xeno-Execu...no.dll
windows10-2004-x64
1Xeno-Execu...no.exe
windows10-2004-x64
10Xeno-Execu...s.json
windows10-2004-x64
3Xeno-Execu...UI.exe
windows10-2004-x64
1Xeno-Execu...g.json
windows10-2004-x64
3Xeno-Execu..._me!!!
windows10-2004-x64
1Xeno-Execu...x.html
windows10-2004-x64
6Xeno-Execu...ain.js
windows10-2004-x64
3Xeno-Execu...lua.js
windows10-2004-x64
3Xeno-Execu...in.css
windows10-2004-x64
7Xeno-Execu...ain.js
windows10-2004-x64
3Xeno-Execu....de.js
windows10-2004-x64
3Xeno-Execu....es.js
windows10-2004-x64
3Xeno-Execu....fr.js
windows10-2004-x64
3Xeno-Execu....it.js
windows10-2004-x64
3Xeno-Execu....ja.js
windows10-2004-x64
3Xeno-Execu...nls.js
windows10-2004-x64
3Xeno-Execu....ko.js
windows10-2004-x64
3Xeno-Execu....ru.js
windows10-2004-x64
3Xeno-Execu...-cn.js
windows10-2004-x64
3Xeno-Execu...-tw.js
windows10-2004-x64
3Xeno-Execu...der.js
windows10-2004-x64
3Xeno-Execu...or.lua
windows10-2004-x64
3Xeno-Execu...er.dll
windows10-2004-x64
1Xeno-Execu...ve.lua
windows10-2004-x64
3Xeno-Execu...ut.lua
windows10-2004-x64
3Xeno-Execu..._me!!!
windows10-2004-x64
1Analysis
-
max time kernel
51s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 00:32
Behavioral task
behavioral1
Sample
Xeno-Executor-v1.0.8-main.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Xeno-Executor-v1.0.8-main/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Xeno-Executor-v1.0.8-main/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Xeno-Executor-v1.0.8-main/Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Xeno-Executor-v1.0.8-main/README.md
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
Xeno-Executor-v1.0.8-main/Xeno.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Xeno-Executor-v1.0.8-main/Xeno.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
Xeno-Executor-v1.0.8-main/XenoUI.deps.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Xeno-Executor-v1.0.8-main/XenoUI.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
Xeno-Executor-v1.0.8-main/XenoUI.runtimeconfig.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Xeno-Executor-v1.0.8-main/autoexec/del_me!!!
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/index.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/base/worker/workerMain.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/basic-languages/lua/lua.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.css
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.nls.de.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.nls.es.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.nls.fr.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.nls.it.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.nls.ja.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.nls.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.nls.ko.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.nls.ru.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.nls.zh-cn.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.nls.zh-tw.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/loader.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral28
Sample
Xeno-Executor-v1.0.8-main/bin/editor.lua
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Xeno-Executor-v1.0.8-main/runtimes/win-arm64/native/WebView2Loader.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
Xeno-Executor-v1.0.8-main/scripts/Sine Wave.lua
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Xeno-Executor-v1.0.8-main/scripts/Spinning Donut.lua
Resource
win10v2004-20241007-en
Behavioral task
behavioral32
Sample
Xeno-Executor-v1.0.8-main/workspace/del_me!!!
Resource
win10v2004-20241007-en
General
-
Target
Xeno-Executor-v1.0.8-main.zip
-
Size
4.1MB
-
MD5
5f092e0d074a1a45f22db0bd55c0931f
-
SHA1
9294aa768de3f0ef8a6468854e2d118c5a72d6fe
-
SHA256
5f6b7fac414c602989c14283e4bfd01a9dad04d84d178a4fd108d1e5d133eaf4
-
SHA512
346eae473dadbd7f05743ea02a49fc4c1fd7a92d8b7e09fa8f8291a5ddf3619e6c0ab1196e4d46a930e54c110abf461966fbf4dae5fff1cf6dfd756b46d2a0a0
-
SSDEEP
98304:4FP5+BAtOValm08CkdzmbjjgAPd1fJ+BOxbaYZ01dvpbN8:4L+B6O8lmNC4SbjjgM1fJ+S1UlS
Malware Config
Extracted
xworm
like-minute.gl.at.ply.gg:57419
-
Install_directory
%AppData%
-
install_file
antivirus.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c98-4.dat family_xworm behavioral1/memory/4916-13-0x00000000007A0000-0x00000000007B4000-memory.dmp family_xworm -
Executes dropped EXE 3 IoCs
pid Process 4916 Xeno.exe 4796 Xeno.exe 5056 Xeno.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 36 ip-api.com -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1756 notepad.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2760 7zFM.exe 2760 7zFM.exe 2760 7zFM.exe 2760 7zFM.exe 2760 7zFM.exe 2760 7zFM.exe 2760 7zFM.exe 2760 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2760 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeRestorePrivilege 2760 7zFM.exe Token: 35 2760 7zFM.exe Token: SeSecurityPrivilege 2760 7zFM.exe Token: SeDebugPrivilege 4916 Xeno.exe Token: SeSecurityPrivilege 2760 7zFM.exe Token: SeDebugPrivilege 4796 Xeno.exe Token: SeSecurityPrivilege 2760 7zFM.exe Token: SeSecurityPrivilege 2760 7zFM.exe Token: SeDebugPrivilege 5056 Xeno.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 2760 7zFM.exe 2760 7zFM.exe 2760 7zFM.exe 2760 7zFM.exe 2760 7zFM.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2760 wrote to memory of 4916 2760 7zFM.exe 100 PID 2760 wrote to memory of 4916 2760 7zFM.exe 100 PID 2760 wrote to memory of 4796 2760 7zFM.exe 108 PID 2760 wrote to memory of 4796 2760 7zFM.exe 108 PID 2760 wrote to memory of 1756 2760 7zFM.exe 114 PID 2760 wrote to memory of 1756 2760 7zFM.exe 114 PID 2760 wrote to memory of 5056 2760 7zFM.exe 117 PID 2760 wrote to memory of 5056 2760 7zFM.exe 117
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Xeno-Executor-v1.0.8-main.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\7zO8CA4A997\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\7zO8CA4A997\Xeno.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
-
C:\Users\Admin\AppData\Local\Temp\7zO8CAEEAB7\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\7zO8CAEEAB7\Xeno.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" "C:\Users\Admin\AppData\Local\Temp\7zO8CA73D58\Xeno.exe"2⤵
- Opens file in notepad (likely ransom note)
PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\7zO8CAA1B08\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\7zO8CAA1B08\Xeno.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5f181bd676c27c82a9041018a1b31cc34
SHA1e5e146d152b5e0e1f533e99693d3226000a68816
SHA25620919e71c5aa9728b8dbd5475b0efabf3a7aa730be17151a9bb2dd21fa1e1dce
SHA512e7b089deb4d23087226f2d5377931466acded58e82f67f7a8bc8e0a20e5bf135c8ea7fce117fb0353357b0a08c3f474a906fe7774d65f9da720de3b19013451e