Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10Xeno-Execu...in.zip
windows10-2004-x64
10Xeno-Execu...re.dll
windows10-2004-x64
1Xeno-Execu...ms.dll
windows10-2004-x64
1Xeno-Execu...pf.dll
windows10-2004-x64
1Xeno-Execu...DME.md
windows10-2004-x64
3Xeno-Execu...no.dll
windows10-2004-x64
1Xeno-Execu...no.exe
windows10-2004-x64
10Xeno-Execu...s.json
windows10-2004-x64
3Xeno-Execu...UI.exe
windows10-2004-x64
1Xeno-Execu...g.json
windows10-2004-x64
3Xeno-Execu..._me!!!
windows10-2004-x64
1Xeno-Execu...x.html
windows10-2004-x64
6Xeno-Execu...ain.js
windows10-2004-x64
3Xeno-Execu...lua.js
windows10-2004-x64
3Xeno-Execu...in.css
windows10-2004-x64
7Xeno-Execu...ain.js
windows10-2004-x64
3Xeno-Execu....de.js
windows10-2004-x64
3Xeno-Execu....es.js
windows10-2004-x64
3Xeno-Execu....fr.js
windows10-2004-x64
3Xeno-Execu....it.js
windows10-2004-x64
3Xeno-Execu....ja.js
windows10-2004-x64
3Xeno-Execu...nls.js
windows10-2004-x64
3Xeno-Execu....ko.js
windows10-2004-x64
3Xeno-Execu....ru.js
windows10-2004-x64
3Xeno-Execu...-cn.js
windows10-2004-x64
3Xeno-Execu...-tw.js
windows10-2004-x64
3Xeno-Execu...der.js
windows10-2004-x64
3Xeno-Execu...or.lua
windows10-2004-x64
3Xeno-Execu...er.dll
windows10-2004-x64
1Xeno-Execu...ve.lua
windows10-2004-x64
3Xeno-Execu...ut.lua
windows10-2004-x64
3Xeno-Execu..._me!!!
windows10-2004-x64
1Analysis
-
max time kernel
1365s -
max time network
1144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 00:32
Behavioral task
behavioral1
Sample
Xeno-Executor-v1.0.8-main.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Xeno-Executor-v1.0.8-main/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Xeno-Executor-v1.0.8-main/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
Xeno-Executor-v1.0.8-main/Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Xeno-Executor-v1.0.8-main/README.md
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
Xeno-Executor-v1.0.8-main/Xeno.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Xeno-Executor-v1.0.8-main/Xeno.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
Xeno-Executor-v1.0.8-main/XenoUI.deps.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Xeno-Executor-v1.0.8-main/XenoUI.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
Xeno-Executor-v1.0.8-main/XenoUI.runtimeconfig.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Xeno-Executor-v1.0.8-main/autoexec/del_me!!!
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/index.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/base/worker/workerMain.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/basic-languages/lua/lua.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.css
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.nls.de.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.nls.es.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.nls.fr.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.nls.it.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.nls.ja.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.nls.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.nls.ko.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.nls.ru.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.nls.zh-cn.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/editor/editor.main.nls.zh-tw.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Xeno-Executor-v1.0.8-main/bin/Monaco/vs/loader.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral28
Sample
Xeno-Executor-v1.0.8-main/bin/editor.lua
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Xeno-Executor-v1.0.8-main/runtimes/win-arm64/native/WebView2Loader.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
Xeno-Executor-v1.0.8-main/scripts/Sine Wave.lua
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Xeno-Executor-v1.0.8-main/scripts/Spinning Donut.lua
Resource
win10v2004-20241007-en
Behavioral task
behavioral32
Sample
Xeno-Executor-v1.0.8-main/workspace/del_me!!!
Resource
win10v2004-20241007-en
General
-
Target
Xeno-Executor-v1.0.8-main/Xeno.exe
-
Size
53KB
-
MD5
f181bd676c27c82a9041018a1b31cc34
-
SHA1
e5e146d152b5e0e1f533e99693d3226000a68816
-
SHA256
20919e71c5aa9728b8dbd5475b0efabf3a7aa730be17151a9bb2dd21fa1e1dce
-
SHA512
e7b089deb4d23087226f2d5377931466acded58e82f67f7a8bc8e0a20e5bf135c8ea7fce117fb0353357b0a08c3f474a906fe7774d65f9da720de3b19013451e
-
SSDEEP
1536:PwssRhl59X3CDNkg6LbcvHbpE42c3UiOQ9GHnUpKX:Pwtl/X8Hbp+c5OQMZX
Malware Config
Extracted
xworm
like-minute.gl.at.ply.gg:57419
-
Install_directory
%AppData%
-
install_file
antivirus.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral7/memory/4444-1-0x0000000000CB0000-0x0000000000CC4000-memory.dmp family_xworm -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4444 Xeno.exe