Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
09/03/2025, 03:20
Behavioral task
behavioral1
Sample
Xeno.exe
Resource
win7-20241010-en
General
-
Target
Xeno.exe
-
Size
3.0MB
-
MD5
158b3d88e3cebfa581703ee917bad272
-
SHA1
759c69673d8326e8e73e72297bf0ac4eb1e0a217
-
SHA256
919161265bdda133ab4c6693baa0d603c7713ca71636d262c1d3a5805d28d05d
-
SHA512
023af21a4c339559124df0d5cc280dfa63d7824ea7474c92f95cfa04b482bd879ff359b1511f8bd4e35f2344bae84fadb8ff8f784d792575197f1aba9211f189
-
SSDEEP
49152:ytlcyXfHnaBTof9ePCjkIAm1skqXfd+/9A9ByClY1v/a/ehH7pNLLn2:yfZXfHaFoCIvqkqXf0FglY1XOe97vLn
Malware Config
Extracted
xworm
5.0
earth-northwest.gl.at.ply.gg:49617
jek2DMhZuJKlksdl
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000019490-9.dat family_xworm behavioral1/memory/1148-13-0x0000000000210000-0x0000000000220000-memory.dmp family_xworm -
Xworm family
-
Executes dropped EXE 3 IoCs
pid Process 2544 BOOTSTRAPPERNEW.EXE 1148 SOLARA.EXE 1156 Process not Found -
Loads dropped DLL 2 IoCs
pid Process 1704 Xeno.exe 1704 Xeno.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Xeno.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1148 SOLARA.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2544 1704 Xeno.exe 31 PID 1704 wrote to memory of 2544 1704 Xeno.exe 31 PID 1704 wrote to memory of 2544 1704 Xeno.exe 31 PID 1704 wrote to memory of 2544 1704 Xeno.exe 31 PID 1704 wrote to memory of 1148 1704 Xeno.exe 32 PID 1704 wrote to memory of 1148 1704 Xeno.exe 32 PID 1704 wrote to memory of 1148 1704 Xeno.exe 32 PID 1704 wrote to memory of 1148 1704 Xeno.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xeno.exe"C:\Users\Admin\AppData\Local\Temp\Xeno.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERNEW.EXE"C:\Users\Admin\AppData\Local\Temp\BOOTSTRAPPERNEW.EXE"2⤵
- Executes dropped EXE
PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\SOLARA.EXE"C:\Users\Admin\AppData\Local\Temp\SOLARA.EXE"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5f227cdfd423b3cc03bb69c49babf4da3
SHA13db5a97d9b0f2545e7ba97026af6c28512200441
SHA256cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8
SHA512b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e
-
Filesize
40KB
MD56aaa04f906e1966d6d97b0855ea1fa7f
SHA18b08c6ae9f383b8d819e852552c2ea7af707f51e
SHA256619979ec317a16e0a29953786279c36294f2b78338f152242f6536d458819262
SHA5120cf695a4b8367f28196e329ccdbec7877cb55cefa548a6388d12977951225f20cc70bf99ce575433cf51c30546e03e765121bd2f8b89bdefa703d7e4e50f6383