Analysis
-
max time kernel
134s -
max time network
151s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
18-11-2024 14:05
Behavioral task
behavioral1
Sample
Xeno.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Xeno.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Xeno.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
Xeno.exe
Resource
win11-20241007-en
General
-
Target
Xeno.exe
-
Size
70KB
-
MD5
1edee495fc92dcfdbfb89c0202f87b29
-
SHA1
38d6c9154e066daa75d9a4f2346a1b7b7c84da2b
-
SHA256
d87423760f97f5010d3589c0e7d5e704a698b4562b5d9de627b6d756a29cefe3
-
SHA512
11709a00d0b5bb50b172344295c216f51a450d5e936fb15c5834a6a167d1ef75e1d510f94ff2105b87f41b1ff607843d4e365c056693e8b5a1d873bae013d1ac
-
SSDEEP
1536:mvdK/frfAdNtG6zJllzZ+bPsag6Ha3OqY7l:LEXQM+bPsWa3Oqul
Malware Config
Extracted
xworm
20.ip.gl.ply.gg:53128
-
Install_directory
%LocalAppData%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral3/memory/2504-1-0x0000000000080000-0x0000000000098000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1672 powershell.exe 1372 powershell.exe 1692 powershell.exe 2396 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\Control Panel\International\Geo\Nation Xeno.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk Xeno.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk Xeno.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3495501434-311648039-2993076821-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Local\\svchost.exe" Xeno.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2396 powershell.exe 2396 powershell.exe 1672 powershell.exe 1672 powershell.exe 1372 powershell.exe 1372 powershell.exe 1692 powershell.exe 1692 powershell.exe 2504 Xeno.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2504 Xeno.exe Token: SeDebugPrivilege 2396 powershell.exe Token: SeIncreaseQuotaPrivilege 2396 powershell.exe Token: SeSecurityPrivilege 2396 powershell.exe Token: SeTakeOwnershipPrivilege 2396 powershell.exe Token: SeLoadDriverPrivilege 2396 powershell.exe Token: SeSystemProfilePrivilege 2396 powershell.exe Token: SeSystemtimePrivilege 2396 powershell.exe Token: SeProfSingleProcessPrivilege 2396 powershell.exe Token: SeIncBasePriorityPrivilege 2396 powershell.exe Token: SeCreatePagefilePrivilege 2396 powershell.exe Token: SeBackupPrivilege 2396 powershell.exe Token: SeRestorePrivilege 2396 powershell.exe Token: SeShutdownPrivilege 2396 powershell.exe Token: SeDebugPrivilege 2396 powershell.exe Token: SeSystemEnvironmentPrivilege 2396 powershell.exe Token: SeRemoteShutdownPrivilege 2396 powershell.exe Token: SeUndockPrivilege 2396 powershell.exe Token: SeManageVolumePrivilege 2396 powershell.exe Token: 33 2396 powershell.exe Token: 34 2396 powershell.exe Token: 35 2396 powershell.exe Token: 36 2396 powershell.exe Token: SeDebugPrivilege 1672 powershell.exe Token: SeIncreaseQuotaPrivilege 1672 powershell.exe Token: SeSecurityPrivilege 1672 powershell.exe Token: SeTakeOwnershipPrivilege 1672 powershell.exe Token: SeLoadDriverPrivilege 1672 powershell.exe Token: SeSystemProfilePrivilege 1672 powershell.exe Token: SeSystemtimePrivilege 1672 powershell.exe Token: SeProfSingleProcessPrivilege 1672 powershell.exe Token: SeIncBasePriorityPrivilege 1672 powershell.exe Token: SeCreatePagefilePrivilege 1672 powershell.exe Token: SeBackupPrivilege 1672 powershell.exe Token: SeRestorePrivilege 1672 powershell.exe Token: SeShutdownPrivilege 1672 powershell.exe Token: SeDebugPrivilege 1672 powershell.exe Token: SeSystemEnvironmentPrivilege 1672 powershell.exe Token: SeRemoteShutdownPrivilege 1672 powershell.exe Token: SeUndockPrivilege 1672 powershell.exe Token: SeManageVolumePrivilege 1672 powershell.exe Token: 33 1672 powershell.exe Token: 34 1672 powershell.exe Token: 35 1672 powershell.exe Token: 36 1672 powershell.exe Token: SeDebugPrivilege 1372 powershell.exe Token: SeIncreaseQuotaPrivilege 1372 powershell.exe Token: SeSecurityPrivilege 1372 powershell.exe Token: SeTakeOwnershipPrivilege 1372 powershell.exe Token: SeLoadDriverPrivilege 1372 powershell.exe Token: SeSystemProfilePrivilege 1372 powershell.exe Token: SeSystemtimePrivilege 1372 powershell.exe Token: SeProfSingleProcessPrivilege 1372 powershell.exe Token: SeIncBasePriorityPrivilege 1372 powershell.exe Token: SeCreatePagefilePrivilege 1372 powershell.exe Token: SeBackupPrivilege 1372 powershell.exe Token: SeRestorePrivilege 1372 powershell.exe Token: SeShutdownPrivilege 1372 powershell.exe Token: SeDebugPrivilege 1372 powershell.exe Token: SeSystemEnvironmentPrivilege 1372 powershell.exe Token: SeRemoteShutdownPrivilege 1372 powershell.exe Token: SeUndockPrivilege 1372 powershell.exe Token: SeManageVolumePrivilege 1372 powershell.exe Token: 33 1372 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2504 Xeno.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2396 2504 Xeno.exe 84 PID 2504 wrote to memory of 2396 2504 Xeno.exe 84 PID 2504 wrote to memory of 1672 2504 Xeno.exe 90 PID 2504 wrote to memory of 1672 2504 Xeno.exe 90 PID 2504 wrote to memory of 1372 2504 Xeno.exe 94 PID 2504 wrote to memory of 1372 2504 Xeno.exe 94 PID 2504 wrote to memory of 1692 2504 Xeno.exe 96 PID 2504 wrote to memory of 1692 2504 Xeno.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\Xeno.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Xeno.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Xeno.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD583d94e8aa23c7ad2db6f972739506306
SHA1bd6d73d0417971c0077f772352d2f538a6201024
SHA256dfa5cbd243b304f47196c492bc2d8b29941a550c2f076ef8bdfca72755e71881
SHA5124224625e8ef8dadc72f1e1a1edfe2079656b14f2af94ce6128316481d96e9d0b6edf4de13fcdcc182038a2b29eb562b9246f944aecebfcb7c5ee8d7936b6287e
-
Filesize
1KB
MD5b6519c54bdb7fc4ddd1f1c415d01f799
SHA1b306128c9e292956dc4de5475544bbb43bc1fa3b
SHA256bf2ab5877badb03960551f127f41b3577bafff142d444df959c76f6970bc59a3
SHA5121a39fbcb9dca7a667732dbb67ad75eb910680e731c4459408cd189a2b38f165b99bf1725ec403684a9b59b8c0d91063855687dcf95b9598e56373106760a55b8
-
Filesize
1KB
MD5fc033e24ab289adcc7ebcb4a1c777086
SHA111d8d38b7cea7ef3b064c01fa2f77de506dfbda4
SHA256184d42d4edb2ea9fb27fbfed34fcab9c902e1ab9b745dae395ddb4fff20909d0
SHA512e1c353070aa92ae7bd0b368aae8e6008a8279c02a8b9c511454cb438229be747dbee1f4442f4468da0243388b1d7d6e70ca832daa4767a6358369fc560d0a2f0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82