Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
125s -
max time network
126s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
28/02/2025, 18:18
Behavioral task
behavioral1
Sample
Xeno.exe
Resource
win10ltsc2021-20250217-en
Errors
General
-
Target
Xeno.exe
-
Size
69KB
-
MD5
4e8074b05433894b629f67b4770d5474
-
SHA1
f71e57d6bda8a72a7760d358e63664136b8a7bb7
-
SHA256
480c3389177a32a663b3c484507f00a646a6b4a10c3532527bdc0dcd78c7d259
-
SHA512
de0726f1335c757925170f496181ee66b29231034c6ab205f54fc265370485bbf1eedfadaaba4b57fd78d6057860630ccd1bada035d71ae74b8f0a5349329e89
-
SSDEEP
1536:2SuDiZ0QURBoIKoPyS2I+bqpO1Xd7UEx6M0O8RLZ68i:2SuDaURKkPJt+bwwURO85M8i
Malware Config
Extracted
xworm
cause-indexes.gl.at.ply.gg:17210
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/3048-1-0x0000000000810000-0x0000000000826000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5552 powershell.exe 3996 powershell.exe 3044 powershell.exe 1088 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2501448743-3279416841-701563739-1000\Control Panel\International\Geo\Nation Xeno.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk Xeno.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk Xeno.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2501448743-3279416841-701563739-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" Xeno.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "88" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5552 powershell.exe 5552 powershell.exe 3996 powershell.exe 3996 powershell.exe 3044 powershell.exe 3044 powershell.exe 1088 powershell.exe 1088 powershell.exe 3048 Xeno.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 3048 Xeno.exe 3048 Xeno.exe 3048 Xeno.exe 3048 Xeno.exe 3048 Xeno.exe 3048 Xeno.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 3048 Xeno.exe 3048 Xeno.exe 3048 Xeno.exe 3048 Xeno.exe 3048 Xeno.exe 3048 Xeno.exe 5112 taskmgr.exe 3048 Xeno.exe 3048 Xeno.exe 3048 Xeno.exe 3048 Xeno.exe 3048 Xeno.exe 3048 Xeno.exe 3048 Xeno.exe 3048 Xeno.exe 3048 Xeno.exe 3048 Xeno.exe 3048 Xeno.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3048 Xeno.exe Token: SeDebugPrivilege 5552 powershell.exe Token: SeIncreaseQuotaPrivilege 5552 powershell.exe Token: SeSecurityPrivilege 5552 powershell.exe Token: SeTakeOwnershipPrivilege 5552 powershell.exe Token: SeLoadDriverPrivilege 5552 powershell.exe Token: SeSystemProfilePrivilege 5552 powershell.exe Token: SeSystemtimePrivilege 5552 powershell.exe Token: SeProfSingleProcessPrivilege 5552 powershell.exe Token: SeIncBasePriorityPrivilege 5552 powershell.exe Token: SeCreatePagefilePrivilege 5552 powershell.exe Token: SeBackupPrivilege 5552 powershell.exe Token: SeRestorePrivilege 5552 powershell.exe Token: SeShutdownPrivilege 5552 powershell.exe Token: SeDebugPrivilege 5552 powershell.exe Token: SeSystemEnvironmentPrivilege 5552 powershell.exe Token: SeRemoteShutdownPrivilege 5552 powershell.exe Token: SeUndockPrivilege 5552 powershell.exe Token: SeManageVolumePrivilege 5552 powershell.exe Token: 33 5552 powershell.exe Token: 34 5552 powershell.exe Token: 35 5552 powershell.exe Token: 36 5552 powershell.exe Token: SeDebugPrivilege 3996 powershell.exe Token: SeIncreaseQuotaPrivilege 3996 powershell.exe Token: SeSecurityPrivilege 3996 powershell.exe Token: SeTakeOwnershipPrivilege 3996 powershell.exe Token: SeLoadDriverPrivilege 3996 powershell.exe Token: SeSystemProfilePrivilege 3996 powershell.exe Token: SeSystemtimePrivilege 3996 powershell.exe Token: SeProfSingleProcessPrivilege 3996 powershell.exe Token: SeIncBasePriorityPrivilege 3996 powershell.exe Token: SeCreatePagefilePrivilege 3996 powershell.exe Token: SeBackupPrivilege 3996 powershell.exe Token: SeRestorePrivilege 3996 powershell.exe Token: SeShutdownPrivilege 3996 powershell.exe Token: SeDebugPrivilege 3996 powershell.exe Token: SeSystemEnvironmentPrivilege 3996 powershell.exe Token: SeRemoteShutdownPrivilege 3996 powershell.exe Token: SeUndockPrivilege 3996 powershell.exe Token: SeManageVolumePrivilege 3996 powershell.exe Token: 33 3996 powershell.exe Token: 34 3996 powershell.exe Token: 35 3996 powershell.exe Token: 36 3996 powershell.exe Token: SeDebugPrivilege 3044 powershell.exe Token: SeIncreaseQuotaPrivilege 3044 powershell.exe Token: SeSecurityPrivilege 3044 powershell.exe Token: SeTakeOwnershipPrivilege 3044 powershell.exe Token: SeLoadDriverPrivilege 3044 powershell.exe Token: SeSystemProfilePrivilege 3044 powershell.exe Token: SeSystemtimePrivilege 3044 powershell.exe Token: SeProfSingleProcessPrivilege 3044 powershell.exe Token: SeIncBasePriorityPrivilege 3044 powershell.exe Token: SeCreatePagefilePrivilege 3044 powershell.exe Token: SeBackupPrivilege 3044 powershell.exe Token: SeRestorePrivilege 3044 powershell.exe Token: SeShutdownPrivilege 3044 powershell.exe Token: SeDebugPrivilege 3044 powershell.exe Token: SeSystemEnvironmentPrivilege 3044 powershell.exe Token: SeRemoteShutdownPrivilege 3044 powershell.exe Token: SeUndockPrivilege 3044 powershell.exe Token: SeManageVolumePrivilege 3044 powershell.exe Token: 33 3044 powershell.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 3048 Xeno.exe 3048 Xeno.exe 3048 Xeno.exe 3048 Xeno.exe 3048 Xeno.exe 3048 Xeno.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe 5112 taskmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3048 Xeno.exe 5536 LogonUI.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3048 wrote to memory of 5552 3048 Xeno.exe 82 PID 3048 wrote to memory of 5552 3048 Xeno.exe 82 PID 3048 wrote to memory of 3996 3048 Xeno.exe 87 PID 3048 wrote to memory of 3996 3048 Xeno.exe 87 PID 3048 wrote to memory of 3044 3048 Xeno.exe 89 PID 3048 wrote to memory of 3044 3048 Xeno.exe 89 PID 3048 wrote to memory of 1088 3048 Xeno.exe 91 PID 3048 wrote to memory of 1088 3048 Xeno.exe 91 PID 3048 wrote to memory of 4968 3048 Xeno.exe 100 PID 3048 wrote to memory of 4968 3048 Xeno.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\Xeno.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Xeno.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5552
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Xeno.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
-
C:\Windows\SYSTEM32\shutdown.exeshutdown.exe /f /s /t 02⤵PID:4968
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5112
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39d5855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD560b3262c3163ee3d466199160b9ed07d
SHA1994ece4ea4e61de0be2fdd580f87e3415f9e1ff6
SHA256e3b30f16d41f94cba2b8a75f35c91ae7418465abfbfe5477ec0551d1952b2fdb
SHA512081d2015cb94477eb0fbc38f44b6d9b4a3204fb3ad0b7d0e146a88ab4ab9a0d475207f1adae03f4a81ccc5beb7568dc8be1249f69e32fe56efd9ee2f6ee3b1af
-
Filesize
1KB
MD5cc23290d37ee7ef96108403dca3e40bb
SHA1f3900f743488bd7d79294a1874926b6ff9c968c0
SHA256f70a32a91221754ff21f1dc7f725d7690d8264dbb98df7b06ca280f36f08184c
SHA5124d8d577061b902bd3b46bb3b4988dd47e85d7ea08a1cfea2b3df5edef040884f5b357b72098e3e7a1565b6f6e244aca8d99088652ebc9bf78620cbef84cc0845
-
Filesize
1KB
MD52879755c37735aee79eb6b06e5952f3f
SHA18f7e6f73f2ee82022bd93633a1d914d65a6fd2a2
SHA25600de7e1a55a4bd2fbf8c0ec30d7a1f626a638e88aa03629046190d9391717ad1
SHA512ebda3165400670f533f3b52703c6b443597bb36d7891806a86542b1cd56b7fa8cd859beaf7251ceb17ac4d1c6326562efea1d6355ac583688bdf59aef2aea0e6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82