Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
98s -
max time network
99s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/03/2025, 03:17
Behavioral task
behavioral1
Sample
Xeno.exe
Resource
win10v2004-20250217-en
General
-
Target
Xeno.exe
-
Size
3.0MB
-
MD5
158b3d88e3cebfa581703ee917bad272
-
SHA1
759c69673d8326e8e73e72297bf0ac4eb1e0a217
-
SHA256
919161265bdda133ab4c6693baa0d603c7713ca71636d262c1d3a5805d28d05d
-
SHA512
023af21a4c339559124df0d5cc280dfa63d7824ea7474c92f95cfa04b482bd879ff359b1511f8bd4e35f2344bae84fadb8ff8f784d792575197f1aba9211f189
-
SSDEEP
49152:ytlcyXfHnaBTof9ePCjkIAm1skqXfd+/9A9ByClY1v/a/ehH7pNLLn2:yfZXfHaFoCIvqkqXf0FglY1XOe97vLn
Malware Config
Extracted
xworm
5.0
earth-northwest.gl.at.ply.gg:49617
jek2DMhZuJKlksdl
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x004900000002acc4-21.dat family_xworm behavioral2/memory/4252-24-0x0000000000870000-0x0000000000880000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 2 IoCs
pid Process 2428 BOOTSTRAPPERNEW.EXE 4252 SOLARA.EXE -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4252 SOLARA.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5100 wrote to memory of 2428 5100 Xeno.exe 81 PID 5100 wrote to memory of 2428 5100 Xeno.exe 81 PID 5100 wrote to memory of 4252 5100 Xeno.exe 82 PID 5100 wrote to memory of 4252 5100 Xeno.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\Xeno.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERNEW.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERNEW.EXE"2⤵
- Executes dropped EXE
PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\SOLARA.EXE"C:\Users\Admin\AppData\Local\Temp\SOLARA.EXE"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5f227cdfd423b3cc03bb69c49babf4da3
SHA13db5a97d9b0f2545e7ba97026af6c28512200441
SHA256cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8
SHA512b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e
-
Filesize
40KB
MD56aaa04f906e1966d6d97b0855ea1fa7f
SHA18b08c6ae9f383b8d819e852552c2ea7af707f51e
SHA256619979ec317a16e0a29953786279c36294f2b78338f152242f6536d458819262
SHA5120cf695a4b8367f28196e329ccdbec7877cb55cefa548a6388d12977951225f20cc70bf99ce575433cf51c30546e03e765121bd2f8b89bdefa703d7e4e50f6383