Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2025, 14:38
Behavioral task
behavioral1
Sample
Xeno.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Xeno.exe
Resource
win10v2004-20250217-en
General
-
Target
Xeno.exe
-
Size
60KB
-
MD5
5f83231a9defe33363c22c05cb083d4c
-
SHA1
13cfab281b4d730a591f81adc0ae6c237675a65b
-
SHA256
6044f92bdc0a3b4bc81146ab4df57428a0e106777131b8ffca1ee9f1a8d2962e
-
SHA512
fdc814b0154dc517c14082ca9f658f8c490d09a08171eb6425e9394e01195b8474e229731811ad313ddabe020aa41a8778c705159b31d93b7e646b1f7942b959
-
SSDEEP
1536:nFFgs2DJZRprX9iLX7al8Gq+bMIRWIEqcN6tOfVg8TB:n3h48Xp+bMfqOfVpTB
Malware Config
Extracted
xworm
cause-indexes.gl.at.ply.gg:17210
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral2/memory/4600-59-0x0000000002940000-0x000000000294E000-memory.dmp disable_win_def -
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4600-1-0x0000000000820000-0x0000000000834000-memory.dmp family_xworm -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" tktulf.exe -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2788 powershell.exe 744 powershell.exe 3240 powershell.exe 4636 powershell.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe tktulf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tktulf.exe" tktulf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe tktulf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tktulf.exe" tktulf.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Xeno.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk Xeno.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk Xeno.exe -
Executes dropped EXE 2 IoCs
pid Process 4844 tktulf.exe 4624 tktulf.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" Xeno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Java = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tktulf.exe" tktulf.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" tktulf.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 tktulf.exe -
resource yara_rule behavioral2/files/0x000a000000023d48-65.dat upx behavioral2/memory/4844-68-0x0000000000400000-0x00000000006D8000-memory.dmp upx behavioral2/memory/4624-72-0x0000000000400000-0x00000000006D8000-memory.dmp upx behavioral2/memory/4624-73-0x0000000000400000-0x00000000006D8000-memory.dmp upx behavioral2/memory/4844-90-0x0000000000400000-0x00000000006D8000-memory.dmp upx behavioral2/memory/4844-93-0x0000000000400000-0x00000000006D8000-memory.dmp upx behavioral2/memory/4844-114-0x0000000000400000-0x00000000006D8000-memory.dmp upx behavioral2/memory/4844-135-0x0000000000400000-0x00000000006D8000-memory.dmp upx behavioral2/memory/4844-158-0x0000000000400000-0x00000000006D8000-memory.dmp upx behavioral2/memory/4844-179-0x0000000000400000-0x00000000006D8000-memory.dmp upx behavioral2/memory/4844-200-0x0000000000400000-0x00000000006D8000-memory.dmp upx behavioral2/memory/4844-221-0x0000000000400000-0x00000000006D8000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tktulf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tktulf.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2788 powershell.exe 2788 powershell.exe 744 powershell.exe 744 powershell.exe 3240 powershell.exe 3240 powershell.exe 4636 powershell.exe 4636 powershell.exe 4600 Xeno.exe 4600 Xeno.exe 4600 Xeno.exe 4600 Xeno.exe 4600 Xeno.exe 4600 Xeno.exe 4600 Xeno.exe 4600 Xeno.exe 4600 Xeno.exe 4600 Xeno.exe 4600 Xeno.exe 4600 Xeno.exe 4600 Xeno.exe 4600 Xeno.exe 4600 Xeno.exe 4600 Xeno.exe 4600 Xeno.exe 4600 Xeno.exe 4600 Xeno.exe 4600 Xeno.exe 4600 Xeno.exe 4600 Xeno.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe 4844 tktulf.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4844 tktulf.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4600 Xeno.exe Token: SeDebugPrivilege 2788 powershell.exe Token: SeDebugPrivilege 744 powershell.exe Token: SeDebugPrivilege 3240 powershell.exe Token: SeDebugPrivilege 4636 powershell.exe Token: SeDebugPrivilege 4600 Xeno.exe Token: SeBackupPrivilege 4844 tktulf.exe Token: SeRestorePrivilege 4844 tktulf.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4600 Xeno.exe 4844 tktulf.exe 4624 tktulf.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4600 wrote to memory of 2788 4600 Xeno.exe 91 PID 4600 wrote to memory of 2788 4600 Xeno.exe 91 PID 4600 wrote to memory of 744 4600 Xeno.exe 94 PID 4600 wrote to memory of 744 4600 Xeno.exe 94 PID 4600 wrote to memory of 3240 4600 Xeno.exe 97 PID 4600 wrote to memory of 3240 4600 Xeno.exe 97 PID 4600 wrote to memory of 4636 4600 Xeno.exe 99 PID 4600 wrote to memory of 4636 4600 Xeno.exe 99 PID 4600 wrote to memory of 4844 4600 Xeno.exe 113 PID 4600 wrote to memory of 4844 4600 Xeno.exe 113 PID 4600 wrote to memory of 4844 4600 Xeno.exe 113 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System tktulf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" tktulf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\HideFastUserSwitching = "1" tktulf.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\Xeno.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Xeno.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Xeno.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:744
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
C:\Users\Admin\AppData\Local\Temp\tktulf.exe"C:\Users\Admin\AppData\Local\Temp\tktulf.exe"2⤵
- UAC bypass
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\tktulf.exeC:\Users\Admin\AppData\Local\Temp\tktulf.exe explorer.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4624
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d3e9c29fe44e90aae6ed30ccf799ca8
SHA1c7974ef72264bbdf13a2793ccf1aed11bc565dce
SHA2562360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d
SHA51260c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a
-
Filesize
944B
MD53737c3eb5510d74c3d6ea770e9ff4ffb
SHA188148610a4f00560b06bc8607794d85f15bf3b64
SHA256b716e0860cc27dd1035a125f44833c5999f4a0429635df6d97634f041b25effa
SHA512db4db804933ab50bf56130a939040e33a57e4ec056c9e0c598bcae86bbaf093e2a22fd4ec8801f6b029985170f17859a931e63f28a7abb4f91780da2a33e1ebc
-
Filesize
944B
MD5ba169f4dcbbf147fe78ef0061a95e83b
SHA192a571a6eef49fff666e0f62a3545bcd1cdcda67
SHA2565ef1421e19fde4bc03cd825dd7d6c0e7863f85fd8f0aa4a4d4f8d555dc7606d1
SHA5128d2e5e552210dcda684682538bc964fdd8a8ff5b24cc2cc8af813729f0202191f98eb42d38d2355df17ae620fe401aad6ceaedaed3b112fdacd32485a3a0c07c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.7MB
MD56e628c5531010f1053fff090a7699659
SHA1237e5b8870092dd0e9a3b0fb76da93fcfce56516
SHA25652d65a486dd027d9d6e3ca10ea808815ff0fda4e5032695333b7c2d5a5f95e41
SHA51253eb023d70038b2820a6c0ed0a453307f90b22279e521fa8af3b6ef240ce022300a1d05794bf02d52f472c5adeb87c814373c5e29b3f13102c0128af06d5f0e7