Overview
overview
10Static
static
3Xeno-v1.1....re.dll
windows7-x64
1Xeno-v1.1....re.dll
windows10-2004-x64
1Xeno-v1.1....ms.dll
windows7-x64
1Xeno-v1.1....ms.dll
windows10-2004-x64
1Xeno-v1.1....pf.dll
windows7-x64
1Xeno-v1.1....pf.dll
windows10-2004-x64
1Xeno-v1.1....on.dll
windows7-x64
1Xeno-v1.1....on.dll
windows10-2004-x64
1Xeno-v1.1.5/Xeno.dll
windows7-x64
1Xeno-v1.1.5/Xeno.dll
windows10-2004-x64
1Xeno-v1.1.5/Xeno.exe
windows7-x64
10Xeno-v1.1.5/Xeno.exe
windows10-2004-x64
10Xeno-v1.1....UI.exe
windows7-x64
1Xeno-v1.1....UI.exe
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....-0.dll
windows10-2004-x64
1Xeno-v1.1....x.html
windows7-x64
6Xeno-v1.1....x.html
windows10-2004-x64
6Xeno-v1.1....ain.js
windows7-x64
3Xeno-v1.1....ain.js
windows10-2004-x64
3Xeno-v1.1....lua.js
windows7-x64
3Xeno-v1.1....lua.js
windows10-2004-x64
3Xeno-v1.1....ain.js
windows7-x64
3Xeno-v1.1....ain.js
windows10-2004-x64
3Xeno-v1.1.....de.js
windows7-x64
3Xeno-v1.1.....de.js
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/03/2025, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
Xeno-v1.1.5/Microsoft.Web.WebView2.Core.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Xeno-v1.1.5/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Xeno-v1.1.5/Microsoft.Web.WebView2.WinForms.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Xeno-v1.1.5/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
Xeno-v1.1.5/Microsoft.Web.WebView2.Wpf.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Xeno-v1.1.5/Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
Xeno-v1.1.5/Newtonsoft.Json.dll
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
Xeno-v1.1.5/Newtonsoft.Json.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
Xeno-v1.1.5/Xeno.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Xeno-v1.1.5/Xeno.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
Xeno-v1.1.5/Xeno.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Xeno-v1.1.5/Xeno.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
Xeno-v1.1.5/XenoUI.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Xeno-v1.1.5/XenoUI.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
Xeno-v1.1.5/api-ms-win-crt-convert-l1-1-0.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral16
Sample
Xeno-v1.1.5/api-ms-win-crt-filesystem-l1-1-0.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
Xeno-v1.1.5/api-ms-win-crt-heap-l1-1-0.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral18
Sample
Xeno-v1.1.5/api-ms-win-crt-locale-l1-1-0.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
Xeno-v1.1.5/api-ms-win-crt-math-l1-1-0.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral20
Sample
Xeno-v1.1.5/api-ms-win-crt-runtime-l1-1-0.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
Xeno-v1.1.5/api-ms-win-crt-stdio-l1-1-0.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral22
Sample
Xeno-v1.1.5/api-ms-win-crt-string-l1-1-0.dll
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
Xeno-v1.1.5/bin/Monaco/index.html
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
Xeno-v1.1.5/bin/Monaco/index.html
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
Xeno-v1.1.5/bin/Monaco/vs/base/worker/workerMain.js
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
Xeno-v1.1.5/bin/Monaco/vs/base/worker/workerMain.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
Xeno-v1.1.5/bin/Monaco/vs/basic-languages/lua/lua.js
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Xeno-v1.1.5/bin/Monaco/vs/basic-languages/lua/lua.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
Xeno-v1.1.5/bin/Monaco/vs/editor/editor.main.js
Resource
win7-20250207-en
Behavioral task
behavioral30
Sample
Xeno-v1.1.5/bin/Monaco/vs/editor/editor.main.js
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
Xeno-v1.1.5/bin/Monaco/vs/editor/editor.main.nls.de.js
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Xeno-v1.1.5/bin/Monaco/vs/editor/editor.main.nls.de.js
Resource
win10v2004-20250217-en
General
-
Target
Xeno-v1.1.5/Xeno.exe
-
Size
225KB
-
MD5
e03118ab68063079f8b8f97507ec10ab
-
SHA1
2652e546789203e17149f8b6effa638171c34d7a
-
SHA256
4528beec0d1a6a49312a3dc6fd24cf39583bca4646764461729a515764f0ab56
-
SHA512
2e35e51114c715da304c65b1581c6d56198b10103ac629b8f57467061c657e82429b42954a33629ccc6602f91ad8627feec25c2f491a0992627f2f8611240625
-
SSDEEP
6144:6R+gPJiKheiCNFxwPTdwkuwtAw7Du9ZUZU4ByGKCJh6:4PcKheiFT5fZcZ2U4ByGKCJh6
Malware Config
Extracted
xworm
127.0.0.1:1161
25.ip.gl.ply.gg:1161
-
Install_directory
%AppData%
-
install_file
schvost.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral11/files/0x000b000000012029-5.dat family_xworm behavioral11/memory/1592-12-0x0000000000F60000-0x0000000000F78000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 2 IoCs
pid Process 1592 mm.m..exe 2120 Xeno.exe -
Loads dropped DLL 1 IoCs
pid Process 1972 Xeno.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1592 mm.m..exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1592 1972 Xeno.exe 30 PID 1972 wrote to memory of 1592 1972 Xeno.exe 30 PID 1972 wrote to memory of 1592 1972 Xeno.exe 30 PID 1972 wrote to memory of 2120 1972 Xeno.exe 31 PID 1972 wrote to memory of 2120 1972 Xeno.exe 31 PID 1972 wrote to memory of 2120 1972 Xeno.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.5\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.5\Xeno.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Roaming\mm.m..exe"C:\Users\Admin\AppData\Roaming\mm.m..exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
C:\Users\Admin\AppData\Roaming\Xeno.exe"C:\Users\Admin\AppData\Roaming\Xeno.exe"2⤵
- Executes dropped EXE
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD54174804f837a3d69acda1c141efacb52
SHA1b009535f3d77e4781c555a4a8ad2a5e245e92263
SHA256b696fa6209b98dbd85567c76e4c02d81b4116653dd4a0396257cf679e740335c
SHA5128c941b63f203fe11d0d9a3f0036a92b92a9e0a5b13ac69d177133e8801b5eed624f2d512f7d22b615704dc46553ed6f5cfe2a1fd5b80cadf256f9a9a7e75c1b4
-
Filesize
140KB
MD570797e0760472325728ba786ca208976
SHA18912f23afbe8b78a9582f2a458b89a7fd697e638
SHA25620744d38bc27d656a095e57bef62a44f5f6317de3672020e8a4a1e1057545764
SHA512787f172cbc18eeb4f8e88420377459f37918edc9aec0105566f9e79555a962d6e89d7d0d6b791475282b2c5fb093c9e85544794639ad2771d9ca4a0e5b456477