Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3XHorionUPDATED.rar
windows10-ltsc 2021-x64
10XHorionUPD...ns.txt
windows10-ltsc 2021-x64
1XHorionUPD...on.exe
windows10-ltsc 2021-x64
10XHorionUPD...nt.exe
windows10-ltsc 2021-x64
3XHorionUPD...er.dll
windows10-ltsc 2021-x64
1XHorionUPD...re.dll
windows10-ltsc 2021-x64
1XHorionUPD...cp.dll
windows10-ltsc 2021-x64
1XHorionUPD...pl.dll
windows10-ltsc 2021-x64
1XHorionUPD...xt.dll
windows10-ltsc 2021-x64
1XHorionUPD...ec.dll
windows10-ltsc 2021-x64
1XHorionUPD...ef.dll
windows10-ltsc 2021-x64
1XHorionUPD...ec.dll
windows10-ltsc 2021-x64
1XHorionUPD...ta.dll
windows10-ltsc 2021-x64
1XHorionUPD...hc.dll
windows10-ltsc 2021-x64
1Analysis
-
max time kernel
92s -
max time network
206s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
01/03/2025, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
XHorionUPDATED.rar
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral2
Sample
XHorionUPDATED/XHorionUPDATED/XHorion/Instructions.txt
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral3
Sample
XHorionUPDATED/XHorionUPDATED/XHorion/XHorion.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral4
Sample
XHorionUPDATED/XHorionUPDATED/XHorion/XHorionClient.exe
Resource
win10ltsc2021-20250218-en
Behavioral task
behavioral5
Sample
XHorionUPDATED/XHorionUPDATED/XHorion/bin/WlanRadioManager.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral6
Sample
XHorionUPDATED/XHorionUPDATED/XHorion/bin/d3d10core.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral7
Sample
XHorionUPDATED/XHorionUPDATED/XHorion/bin/l2nacp.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral8
Sample
XHorionUPDATED/XHorionUPDATED/XHorion/bin/libvpl.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral9
Sample
XHorionUPDATED/XHorionUPDATED/XHorion/bin/msauserext.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral10
Sample
XHorionUPDATED/XHorionUPDATED/XHorion/bin/pstorec.dll
Resource
win10ltsc2021-20250218-en
Behavioral task
behavioral11
Sample
XHorionUPDATED/XHorionUPDATED/XHorion/bin/wlanpref.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral12
Sample
XHorionUPDATED/XHorionUPDATED/XHorion/bin/wlansec.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral13
Sample
XHorionUPDATED/XHorionUPDATED/XHorion/msdelta.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral14
Sample
XHorionUPDATED/XHorionUPDATED/XHorion/nlahc.dll
Resource
win10ltsc2021-20250217-en
General
-
Target
XHorionUPDATED/XHorionUPDATED/XHorion/XHorion.exe
-
Size
381KB
-
MD5
c32d172e5c95cf1aa5b4c613d80ed560
-
SHA1
1c035ac306f5f8f4456d3ecc1d3c8df94880d9db
-
SHA256
dfee0ccb7bec6a99d768fa48b0f604d8fc489a91622a51bcf892aca5a28e3459
-
SHA512
dc3687096cd0dbb095fadf2db0bf56e64bc7ce9c6cce9f52f5d40ec64e76a9a4f5ffc079acac29b1edc18c5d8cf82b63dbc7046c97f4240ca57772d5ae014ba8
-
SSDEEP
6144:HLxAmawQT854JZ7AV4NHnKmLJLde/dclUw7giqRe:aZlsYM4hKmdY/2u
Malware Config
Extracted
xworm
supersigma9-32916.portmap.host:32916
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral3/files/0x000c000000027da6-6.dat family_xworm behavioral3/memory/100-33-0x00000000009C0000-0x00000000009EC000-memory.dmp family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3452737631-513087862-588053281-1000\Control Panel\International\Geo\Nation XHorion.exe -
Executes dropped EXE 2 IoCs
pid Process 100 NovalUPD.exe 3684 HorionInjector.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 100 NovalUPD.exe Token: SeDebugPrivilege 3684 HorionInjector.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 100 2152 XHorion.exe 80 PID 2152 wrote to memory of 100 2152 XHorion.exe 80 PID 2152 wrote to memory of 3684 2152 XHorion.exe 81 PID 2152 wrote to memory of 3684 2152 XHorion.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\XHorionUPDATED\XHorionUPDATED\XHorion\XHorion.exe"C:\Users\Admin\AppData\Local\Temp\XHorionUPDATED\XHorionUPDATED\XHorion\XHorion.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Roaming\NovalUPD.exe"C:\Users\Admin\AppData\Roaming\NovalUPD.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:100
-
-
C:\Users\Admin\AppData\Roaming\HorionInjector.exe"C:\Users\Admin\AppData\Roaming\HorionInjector.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147KB
MD56b5b6e625de774e5c285712b7c4a0da7
SHA1317099aef530afbe3a0c5d6a2743d51e04805267
SHA2562d79af8e1ff3465703e1dc73d3ef2182fd269ea2609c8afabdf1b80693405c1d
SHA512104609adf666588af4e152ec7891cedafd89ad8d427063d03fb42a228babefc59428b0c8b1430cb3fc319a5014d2ee1083ff2b74fa585cab2d86cdad346e8b08
-
Filesize
153KB
MD588595aec6cbe608a5d4536d091a6a091
SHA183ff553779fc12c8d2ef8df22acd6bc1e9a35e47
SHA256697f48b11456f5823959906c062384f70f9c8de6521f74feea7ed54912e0874e
SHA5126efd34a018c46dc2c83611379c480db23f3e76243f3fd16fa4b6876337b2470dccee35ef68017eb688a3be042e246d8169dd7c7c52506396cae0ce07ec95f56a