Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
200s -
max time network
212s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
01/03/2025, 14:37
Behavioral task
behavioral1
Sample
Xeno.exe
Resource
win10ltsc2021-20250217-en
Errors
General
-
Target
Xeno.exe
-
Size
60KB
-
MD5
5f83231a9defe33363c22c05cb083d4c
-
SHA1
13cfab281b4d730a591f81adc0ae6c237675a65b
-
SHA256
6044f92bdc0a3b4bc81146ab4df57428a0e106777131b8ffca1ee9f1a8d2962e
-
SHA512
fdc814b0154dc517c14082ca9f658f8c490d09a08171eb6425e9394e01195b8474e229731811ad313ddabe020aa41a8778c705159b31d93b7e646b1f7942b959
-
SSDEEP
1536:nFFgs2DJZRprX9iLX7al8Gq+bMIRWIEqcN6tOfVg8TB:n3h48Xp+bMfqOfVpTB
Malware Config
Extracted
xworm
cause-indexes.gl.at.ply.gg:17210
-
Install_directory
%AppData%
-
install_file
XClient.exe
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/1104-63-0x0000000000940000-0x000000000094E000-memory.dmp disable_win_def -
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/1104-1-0x0000000000180000-0x0000000000194000-memory.dmp family_xworm -
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fbeptl.exe -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3472 powershell.exe 4352 powershell.exe 1428 powershell.exe 2036 powershell.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fbeptl.exe" fbeptl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe fbeptl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe\Debugger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fbeptl.exe" fbeptl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe fbeptl.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2501448743-3279416841-701563739-1000\Control Panel\International\Geo\Nation Xeno.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk Xeno.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk Xeno.exe -
Executes dropped EXE 2 IoCs
pid Process 3524 fbeptl.exe 2436 fbeptl.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2501448743-3279416841-701563739-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" Xeno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Java = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fbeptl.exe" fbeptl.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fbeptl.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 fbeptl.exe -
resource yara_rule behavioral1/files/0x0008000000027d93-68.dat upx behavioral1/memory/3524-74-0x0000000000400000-0x00000000006D8000-memory.dmp upx behavioral1/memory/2436-78-0x0000000000400000-0x00000000006D8000-memory.dmp upx behavioral1/memory/2436-79-0x0000000000400000-0x00000000006D8000-memory.dmp upx behavioral1/memory/3524-98-0x0000000000400000-0x00000000006D8000-memory.dmp upx behavioral1/memory/3524-101-0x0000000000400000-0x00000000006D8000-memory.dmp upx behavioral1/memory/3524-120-0x0000000000400000-0x00000000006D8000-memory.dmp upx behavioral1/memory/3524-141-0x0000000000400000-0x00000000006D8000-memory.dmp upx behavioral1/memory/3524-164-0x0000000000400000-0x00000000006D8000-memory.dmp upx behavioral1/memory/3524-185-0x0000000000400000-0x00000000006D8000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbeptl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbeptl.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2036 powershell.exe 2036 powershell.exe 3472 powershell.exe 3472 powershell.exe 4352 powershell.exe 4352 powershell.exe 1428 powershell.exe 1428 powershell.exe 1104 Xeno.exe 1104 Xeno.exe 1104 Xeno.exe 1104 Xeno.exe 1104 Xeno.exe 1104 Xeno.exe 1104 Xeno.exe 1104 Xeno.exe 1104 Xeno.exe 1104 Xeno.exe 1104 Xeno.exe 1104 Xeno.exe 1104 Xeno.exe 1104 Xeno.exe 1104 Xeno.exe 1104 Xeno.exe 1104 Xeno.exe 1104 Xeno.exe 1104 Xeno.exe 1104 Xeno.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe 3524 fbeptl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3524 fbeptl.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1104 Xeno.exe Token: SeDebugPrivilege 2036 powershell.exe Token: SeIncreaseQuotaPrivilege 2036 powershell.exe Token: SeSecurityPrivilege 2036 powershell.exe Token: SeTakeOwnershipPrivilege 2036 powershell.exe Token: SeLoadDriverPrivilege 2036 powershell.exe Token: SeSystemProfilePrivilege 2036 powershell.exe Token: SeSystemtimePrivilege 2036 powershell.exe Token: SeProfSingleProcessPrivilege 2036 powershell.exe Token: SeIncBasePriorityPrivilege 2036 powershell.exe Token: SeCreatePagefilePrivilege 2036 powershell.exe Token: SeBackupPrivilege 2036 powershell.exe Token: SeRestorePrivilege 2036 powershell.exe Token: SeShutdownPrivilege 2036 powershell.exe Token: SeDebugPrivilege 2036 powershell.exe Token: SeSystemEnvironmentPrivilege 2036 powershell.exe Token: SeRemoteShutdownPrivilege 2036 powershell.exe Token: SeUndockPrivilege 2036 powershell.exe Token: SeManageVolumePrivilege 2036 powershell.exe Token: 33 2036 powershell.exe Token: 34 2036 powershell.exe Token: 35 2036 powershell.exe Token: 36 2036 powershell.exe Token: SeDebugPrivilege 3472 powershell.exe Token: SeIncreaseQuotaPrivilege 3472 powershell.exe Token: SeSecurityPrivilege 3472 powershell.exe Token: SeTakeOwnershipPrivilege 3472 powershell.exe Token: SeLoadDriverPrivilege 3472 powershell.exe Token: SeSystemProfilePrivilege 3472 powershell.exe Token: SeSystemtimePrivilege 3472 powershell.exe Token: SeProfSingleProcessPrivilege 3472 powershell.exe Token: SeIncBasePriorityPrivilege 3472 powershell.exe Token: SeCreatePagefilePrivilege 3472 powershell.exe Token: SeBackupPrivilege 3472 powershell.exe Token: SeRestorePrivilege 3472 powershell.exe Token: SeShutdownPrivilege 3472 powershell.exe Token: SeDebugPrivilege 3472 powershell.exe Token: SeSystemEnvironmentPrivilege 3472 powershell.exe Token: SeRemoteShutdownPrivilege 3472 powershell.exe Token: SeUndockPrivilege 3472 powershell.exe Token: SeManageVolumePrivilege 3472 powershell.exe Token: 33 3472 powershell.exe Token: 34 3472 powershell.exe Token: 35 3472 powershell.exe Token: 36 3472 powershell.exe Token: SeDebugPrivilege 4352 powershell.exe Token: SeIncreaseQuotaPrivilege 4352 powershell.exe Token: SeSecurityPrivilege 4352 powershell.exe Token: SeTakeOwnershipPrivilege 4352 powershell.exe Token: SeLoadDriverPrivilege 4352 powershell.exe Token: SeSystemProfilePrivilege 4352 powershell.exe Token: SeSystemtimePrivilege 4352 powershell.exe Token: SeProfSingleProcessPrivilege 4352 powershell.exe Token: SeIncBasePriorityPrivilege 4352 powershell.exe Token: SeCreatePagefilePrivilege 4352 powershell.exe Token: SeBackupPrivilege 4352 powershell.exe Token: SeRestorePrivilege 4352 powershell.exe Token: SeShutdownPrivilege 4352 powershell.exe Token: SeDebugPrivilege 4352 powershell.exe Token: SeSystemEnvironmentPrivilege 4352 powershell.exe Token: SeRemoteShutdownPrivilege 4352 powershell.exe Token: SeUndockPrivilege 4352 powershell.exe Token: SeManageVolumePrivilege 4352 powershell.exe Token: 33 4352 powershell.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1104 Xeno.exe 3524 fbeptl.exe 2436 fbeptl.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1104 wrote to memory of 2036 1104 Xeno.exe 86 PID 1104 wrote to memory of 2036 1104 Xeno.exe 86 PID 1104 wrote to memory of 3472 1104 Xeno.exe 90 PID 1104 wrote to memory of 3472 1104 Xeno.exe 90 PID 1104 wrote to memory of 4352 1104 Xeno.exe 93 PID 1104 wrote to memory of 4352 1104 Xeno.exe 93 PID 1104 wrote to memory of 1428 1104 Xeno.exe 95 PID 1104 wrote to memory of 1428 1104 Xeno.exe 95 PID 1104 wrote to memory of 3524 1104 Xeno.exe 101 PID 1104 wrote to memory of 3524 1104 Xeno.exe 101 PID 1104 wrote to memory of 3524 1104 Xeno.exe 101 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" fbeptl.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\HideFastUserSwitching = "1" fbeptl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System fbeptl.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\Xeno.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Xeno.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Xeno.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4352
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Users\Admin\AppData\Local\Temp\fbeptl.exe"C:\Users\Admin\AppData\Local\Temp\fbeptl.exe"2⤵
- UAC bypass
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3524
-
-
C:\Users\Admin\AppData\Local\Temp\fbeptl.exeC:\Users\Admin\AppData\Local\Temp\fbeptl.exe explorer.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2436
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD560b3262c3163ee3d466199160b9ed07d
SHA1994ece4ea4e61de0be2fdd580f87e3415f9e1ff6
SHA256e3b30f16d41f94cba2b8a75f35c91ae7418465abfbfe5477ec0551d1952b2fdb
SHA512081d2015cb94477eb0fbc38f44b6d9b4a3204fb3ad0b7d0e146a88ab4ab9a0d475207f1adae03f4a81ccc5beb7568dc8be1249f69e32fe56efd9ee2f6ee3b1af
-
Filesize
1KB
MD5a8b49ac74fc72576ad0ffc1eaa981ea5
SHA1fd1a7b88aedc63577ddbf854bb96d58482d70559
SHA2561b7baa2ee7472f821db1e869f6fc516c4b49917876233e582e00bf056a3bd712
SHA5123535763c685fc6f60a607da4f1a3b314834d8f1d63619363de71b744abb3ae5b1e1ab63914b0ba04d079dd237512d9854e12d0ab2bfcf4830cc165ec9672c6d4
-
Filesize
1KB
MD560ba7ac90c0e466144b48a90919960b6
SHA1fe7f5d9e1d317f9409d8daa35d9c890f7e222d6a
SHA25643d3c3113c66141b3a1f1f1bbf2d32a80128d029903ca58db09e9c6a9410ef9e
SHA51292a1d912fd7be06820ec97b192b965d04ff44ff6a1c76b55405ecf20ca995762d823f52f174d8f48feb1d454716ab244adb4945febbf4fe4a6f91dd9791f87f2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.7MB
MD56e628c5531010f1053fff090a7699659
SHA1237e5b8870092dd0e9a3b0fb76da93fcfce56516
SHA25652d65a486dd027d9d6e3ca10ea808815ff0fda4e5032695333b7c2d5a5f95e41
SHA51253eb023d70038b2820a6c0ed0a453307f90b22279e521fa8af3b6ef240ce022300a1d05794bf02d52f472c5adeb87c814373c5e29b3f13102c0128af06d5f0e7