Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    98s
  • max time network
    99s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    09/03/2025, 03:17

General

  • Target

    Xeno.exe

  • Size

    3.0MB

  • MD5

    158b3d88e3cebfa581703ee917bad272

  • SHA1

    759c69673d8326e8e73e72297bf0ac4eb1e0a217

  • SHA256

    919161265bdda133ab4c6693baa0d603c7713ca71636d262c1d3a5805d28d05d

  • SHA512

    023af21a4c339559124df0d5cc280dfa63d7824ea7474c92f95cfa04b482bd879ff359b1511f8bd4e35f2344bae84fadb8ff8f784d792575197f1aba9211f189

  • SSDEEP

    49152:ytlcyXfHnaBTof9ePCjkIAm1skqXfd+/9A9ByClY1v/a/ehH7pNLLn2:yfZXfHaFoCIvqkqXf0FglY1XOe97vLn

Malware Config

Extracted

Family

xworm

Version

5.0

C2

earth-northwest.gl.at.ply.gg:49617

Mutex

jek2DMhZuJKlksdl

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Xworm Payload 2 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Executes dropped EXE 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Xeno.exe
    "C:\Users\Admin\AppData\Local\Temp\Xeno.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5100
    • C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERNEW.EXE
      "C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERNEW.EXE"
      2⤵
      • Executes dropped EXE
      PID:2428
    • C:\Users\Admin\AppData\Local\Temp\SOLARA.EXE
      "C:\Users\Admin\AppData\Local\Temp\SOLARA.EXE"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERNEW.EXE

    Filesize

    2.9MB

    MD5

    f227cdfd423b3cc03bb69c49babf4da3

    SHA1

    3db5a97d9b0f2545e7ba97026af6c28512200441

    SHA256

    cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8

    SHA512

    b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e

  • C:\Users\Admin\AppData\Local\Temp\SOLARA.EXE

    Filesize

    40KB

    MD5

    6aaa04f906e1966d6d97b0855ea1fa7f

    SHA1

    8b08c6ae9f383b8d819e852552c2ea7af707f51e

    SHA256

    619979ec317a16e0a29953786279c36294f2b78338f152242f6536d458819262

    SHA512

    0cf695a4b8367f28196e329ccdbec7877cb55cefa548a6388d12977951225f20cc70bf99ce575433cf51c30546e03e765121bd2f8b89bdefa703d7e4e50f6383

  • memory/2428-35-0x0000020671A70000-0x0000020671A86000-memory.dmp

    Filesize

    88KB

  • memory/2428-33-0x0000020671A20000-0x0000020671A46000-memory.dmp

    Filesize

    152KB

  • memory/2428-23-0x0000020656D40000-0x0000020657022000-memory.dmp

    Filesize

    2.9MB

  • memory/2428-43-0x00007FFE24010000-0x00007FFE24AD2000-memory.dmp

    Filesize

    10.8MB

  • memory/2428-26-0x00007FFE24010000-0x00007FFE24AD2000-memory.dmp

    Filesize

    10.8MB

  • memory/2428-27-0x0000020658DB0000-0x0000020658DC0000-memory.dmp

    Filesize

    64KB

  • memory/2428-28-0x00000206756A0000-0x00000206756A8000-memory.dmp

    Filesize

    32KB

  • memory/2428-30-0x00000206718B0000-0x00000206718BE000-memory.dmp

    Filesize

    56KB

  • memory/2428-29-0x00000206718E0000-0x0000020671918000-memory.dmp

    Filesize

    224KB

  • memory/2428-31-0x0000020671920000-0x0000020671A20000-memory.dmp

    Filesize

    1024KB

  • memory/2428-32-0x00000206718C0000-0x00000206718CA000-memory.dmp

    Filesize

    40KB

  • memory/2428-42-0x00007FFE24013000-0x00007FFE24015000-memory.dmp

    Filesize

    8KB

  • memory/2428-34-0x0000020671A60000-0x0000020671A68000-memory.dmp

    Filesize

    32KB

  • memory/2428-20-0x00007FFE24013000-0x00007FFE24015000-memory.dmp

    Filesize

    8KB

  • memory/2428-36-0x0000020671A50000-0x0000020671A5A000-memory.dmp

    Filesize

    40KB

  • memory/2428-38-0x0000020671AA0000-0x0000020671AA8000-memory.dmp

    Filesize

    32KB

  • memory/2428-37-0x00000206718D0000-0x00000206718DA000-memory.dmp

    Filesize

    40KB

  • memory/4252-40-0x00007FFE24010000-0x00007FFE24AD2000-memory.dmp

    Filesize

    10.8MB

  • memory/4252-41-0x00007FFE24010000-0x00007FFE24AD2000-memory.dmp

    Filesize

    10.8MB

  • memory/4252-24-0x0000000000870000-0x0000000000880000-memory.dmp

    Filesize

    64KB

  • memory/4252-25-0x00007FFE24010000-0x00007FFE24AD2000-memory.dmp

    Filesize

    10.8MB