Analysis
-
max time kernel
240s -
max time network
249s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 19:24
Static task
static1
Behavioral task
behavioral1
Sample
exodus-windows-x64-24.37.2.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
exodus-windows-x64-24.37.2.exe
Resource
win10v2004-20240802-en
General
-
Target
exodus-windows-x64-24.37.2.exe
-
Size
222.5MB
-
MD5
616deee795c2cab43b331b9911a1324d
-
SHA1
220259576ffbf3bdc2c82f5998cb9b804ed10b49
-
SHA256
eab3e3b6e8b995b1e61a855aced2ad720125cdeed905488df69935ac0797a61a
-
SHA512
7695d888de5bf4af0f33eec6c5f3ff9c540d768e2fa48a2a42b97061ca3a3acd425bab553a67a291deb8e1f4dadc5e35a68861b1156b510b7c85d469694cb90e
-
SSDEEP
3145728:3QrwAI2n0KjGajGyFv7PAQq7ZUCQ4ljRjE1XzZl/LUCrMarnqWRcVMWrvt7lOZ4Z:grwvhaGpYA7if4rA9zZhLqeYpt0Z4gQz
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2328 Update.exe 2440 Squirrel.exe 2040 Exodus.exe 744 Exodus.exe -
Loads dropped DLL 6 IoCs
pid Process 2528 exodus-windows-x64-24.37.2.exe 2328 Update.exe 2328 Update.exe 2328 Update.exe 2328 Update.exe 2328 Update.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exodus-windows-x64-24.37.2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Squirrel.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2528 exodus-windows-x64-24.37.2.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2328 Update.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2328 2528 exodus-windows-x64-24.37.2.exe 29 PID 2528 wrote to memory of 2328 2528 exodus-windows-x64-24.37.2.exe 29 PID 2528 wrote to memory of 2328 2528 exodus-windows-x64-24.37.2.exe 29 PID 2528 wrote to memory of 2328 2528 exodus-windows-x64-24.37.2.exe 29 PID 2528 wrote to memory of 2328 2528 exodus-windows-x64-24.37.2.exe 29 PID 2528 wrote to memory of 2328 2528 exodus-windows-x64-24.37.2.exe 29 PID 2528 wrote to memory of 2328 2528 exodus-windows-x64-24.37.2.exe 29 PID 2328 wrote to memory of 2440 2328 Update.exe 30 PID 2328 wrote to memory of 2440 2328 Update.exe 30 PID 2328 wrote to memory of 2440 2328 Update.exe 30 PID 2328 wrote to memory of 2440 2328 Update.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\exodus-windows-x64-24.37.2.exe"C:\Users\Admin\AppData\Local\Temp\exodus-windows-x64-24.37.2.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe"C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe" --install .2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\exodus\app-24.37.2\Squirrel.exe"C:\Users\Admin\AppData\Local\exodus\app-24.37.2\Squirrel.exe" --updateSelf=C:\Users\Admin\AppData\Local\SquirrelTemp\Update.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2440
-
-
C:\Users\Admin\AppData\Local\exodus\app-24.37.2\Exodus.exe"C:\Users\Admin\AppData\Local\exodus\app-24.37.2\Exodus.exe" --squirrel-install 24.37.23⤵
- Executes dropped EXE
PID:2040
-
-
C:\Users\Admin\AppData\Local\exodus\app-24.37.2\Exodus.exe"C:\Users\Admin\AppData\Local\exodus\app-24.37.2\Exodus.exe" --squirrel-firstrun3⤵
- Executes dropped EXE
PID:744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79B
MD56c9fb77891307c945de33f9168e68ac5
SHA159e16b728aaee2265e51743fc1d3823390c6ad3e
SHA2568c863657d31f5cea6d320aa2870302666477520894028a50035cdf7de3fab3c0
SHA512a8171a90cfb976f0a4eedd5bb98b3ac2d0a80cf6a584d5f9fe865905cfbce118c3cba88f13cb635d44f6a25554d9c4a0530558f6152af7945a09481a00609881
-
Filesize
10.7MB
MD59b01c5eab2c0bbf63c29944e485c062d
SHA1a8182f1d6363817757d9a4c652ca78591826c803
SHA256eb59903ac99cd42ace0b9204c6f2696c61ced7ff9c94e4da1334b3b5356655fc
SHA512edd950fc94e1c06960541527fda50f2da2f6c99206b691ab465eef69fdae491ca9e3d9b29c3e322f3590a64c73e59c0f24028e873557037a9807e83d946a383b
-
Filesize
352KB
MD5f4fd06cc518f26026049ccce65a4ec81
SHA16298ba68c06b31f1ec19e7ce757c26ff3e6df3f7
SHA256381905c1421a53741029db9ac3b9544bc39daabc8e14a8883ab0b64c5c0d2ca3
SHA512e53583d6a33b8f4b8d9d71aa19b1027b2152e35bc1595ee62916be3f1eb95015b4b1ca70d6bdeaa54742c11a374ccd663062229ce22410dc3d2b96bf8d6538d2
-
Filesize
1.7MB
MD5c5f6cda4976ae38cd9fba3d1e5ebd244
SHA12006c37f01d010963a4331c42e579b87a2d16039
SHA256dae7bd888b715b8e215482bc5ea6f028ded32a3ad88bf4acb6431d2a62ffe3f4
SHA512a1a7529b0ceb3df471e803eac1d9256c009a9c8252884f64a28a59d59753c75e1bff726a35af02db5bdf20a2d194850bfdbed163722b09465ca32d10d059524d
-
Filesize
2.1MB
MD55341b31761b38bb6a42cb155aaea8661
SHA146a98e293a2596d51c8d4171b39fa2549def9d96
SHA25655f4fdbd5fc93ded3565dd1af4d16479be3a27dab565243464107d8a1b114685
SHA512906583cd16ef56dfe13c44fbb4556a0d7d9160e63ab0e6d798d526f5cb7466812a6bbabe95448d339bf8a7ef740229ce39964d2502880ad996dba418d0da6080