Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 23:38
Static task
static1
Behavioral task
behavioral1
Sample
4ac5b8eadc4f8a93f73e638ca3cf8cba83717061462fef44fdb1043c3eff0974N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
4ac5b8eadc4f8a93f73e638ca3cf8cba83717061462fef44fdb1043c3eff0974N.exe
Resource
win10v2004-20241007-en
General
-
Target
4ac5b8eadc4f8a93f73e638ca3cf8cba83717061462fef44fdb1043c3eff0974N.exe
-
Size
593KB
-
MD5
37e9395fb51958c6fa65c8ed3b6748f0
-
SHA1
3d939495657a5144455f2baaf7602242a8b1814b
-
SHA256
4ac5b8eadc4f8a93f73e638ca3cf8cba83717061462fef44fdb1043c3eff0974
-
SHA512
d9dac76c3e1680ba8294969e3d39040ef9b856d3dc9371fb6d30e0dd1962d2ab09acb642c1cf9c0066454a3865f8eaa906fa557fc96ce1d1fb6e4a61d0748ba9
-
SSDEEP
6144:1RjDh4C6OTCSEijJ/IV5CWLAk0PlyD7mm8BktdtU8Waw5B9hhdPAFAEtmM9psA4Q:1zDxTgijJ/yD7sSdt1/OvxCtsHbU2g9
Malware Config
Signatures
-
Expiro family
-
Expiro payload 2 IoCs
resource yara_rule behavioral1/memory/2948-50-0x0000000010000000-0x00000000101A9000-memory.dmp family_expiro1 behavioral1/memory/2580-47-0x0000000100000000-0x00000001001DB000-memory.dmp family_expiro1 -
Executes dropped EXE 4 IoCs
pid Process 2948 mscorsvw.exe 464 Process not Found 2924 mscorsvw.exe 2680 mscorsvw.exe -
Loads dropped DLL 1 IoCs
pid Process 464 Process not Found -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\svchost.exe 4ac5b8eadc4f8a93f73e638ca3cf8cba83717061462fef44fdb1043c3eff0974N.exe File opened for modification \??\c:\windows\system32\alg.exe 4ac5b8eadc4f8a93f73e638ca3cf8cba83717061462fef44fdb1043c3eff0974N.exe File created \??\c:\windows\system32\alg.vir 4ac5b8eadc4f8a93f73e638ca3cf8cba83717061462fef44fdb1043c3eff0974N.exe -
Drops file in Windows directory 15 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log 4ac5b8eadc4f8a93f73e638ca3cf8cba83717061462fef44fdb1043c3eff0974N.exe File created \??\c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_state.vir 4ac5b8eadc4f8a93f73e638ca3cf8cba83717061462fef44fdb1043c3eff0974N.exe File created \??\c:\windows\microsoft.net\framework\v2.0.50727\mscorsvw.vir 4ac5b8eadc4f8a93f73e638ca3cf8cba83717061462fef44fdb1043c3eff0974N.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngenservicelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.lock mscorsvw.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v4.0.30319\aspnet_state.exe 4ac5b8eadc4f8a93f73e638ca3cf8cba83717061462fef44fdb1043c3eff0974N.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v2.0.50727\mscorsvw.exe 4ac5b8eadc4f8a93f73e638ca3cf8cba83717061462fef44fdb1043c3eff0974N.exe File opened for modification \??\c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe 4ac5b8eadc4f8a93f73e638ca3cf8cba83717061462fef44fdb1043c3eff0974N.exe File created \??\c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.vir 4ac5b8eadc4f8a93f73e638ca3cf8cba83717061462fef44fdb1043c3eff0974N.exe File opened for modification \??\c:\windows\microsoft.net\framework\v2.0.50727\mscorsvw.exe 4ac5b8eadc4f8a93f73e638ca3cf8cba83717061462fef44fdb1043c3eff0974N.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat mscorsvw.exe File created \??\c:\windows\microsoft.net\framework64\v2.0.50727\mscorsvw.vir 4ac5b8eadc4f8a93f73e638ca3cf8cba83717061462fef44fdb1043c3eff0974N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscorsvw.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2580 4ac5b8eadc4f8a93f73e638ca3cf8cba83717061462fef44fdb1043c3eff0974N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ac5b8eadc4f8a93f73e638ca3cf8cba83717061462fef44fdb1043c3eff0974N.exe"C:\Users\Admin\AppData\Local\Temp\4ac5b8eadc4f8a93f73e638ca3cf8cba83717061462fef44fdb1043c3eff0974N.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2948
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2924
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
872KB
MD556dae433547221b6722fee7a0e0f22f1
SHA1c1b718e7f65939aab7f45b7f93c258dd24e0902b
SHA256f3f0c4a542d42ceedf490af60f15a95332ff5dea7ec1c5cdf37b7dcb46c8bf04
SHA5127dac2d0d1d43bb5f973efa78dfb2af631d84e2d71045b2567f970dd9bc6eab1b14239d4bf4ae99495bed3b49cae3766578c8019a093c34d4e1b00cb875c7965a
-
Filesize
567KB
MD5e0b3c8c591a6c8f5b662d3f20ae7e15f
SHA15b052fecf34bed1048377af62f779de4e56a2f94
SHA256046d957739e52b78453047aa38b5818dfbd675a765f1d7c7bdcdc3e21aeeba47
SHA512214d891a96bd89b01307ebf9b07f8ef998b242e60d97c6e4f2a886f88a94ab6c7c0fbd6759adc4bac3592091a77aefd0fced47d7f46de78c2e1e62c14f635d3d
-
Filesize
1003KB
MD51f1cb7420054164489ee4659d32920a1
SHA15ebf125fc16c4b3e5bb30ee2db00653fffe20db7
SHA256ad589a90a29fcb5bbfb1e33469387f0e4f731b6e297f2084ceb3651fab810313
SHA512dcd48fbb34fa96101634cc53b028963648e1d73706960b58f0b9cbe814cd95693b4b67eda9b394936ba0af9b4476c78f15fff9094ced120ac34e95307e109a55
-
Filesize
598KB
MD575b3194df0bb51c9a82c3c2953b773aa
SHA1d39b6016c9530bc2b415921d8504a18b54548cab
SHA256cd513d92101e7df3a39448baabb886091043430698b0b21b46c223a0b88d35d5
SHA5124ac7bdf9d4eaedee2ce736f65827b4d4fb789354118944bee76b1c714ea37c04ddb9cdd6202e169ed42351632509d27d4054805d0e07f66b7bd3205dda4ca952
-
Filesize
590KB
MD58fa790a893d786a773f7166c041674b1
SHA1c080dbf35ca3da37ac1ace589551323c7edd74cc
SHA256ab88736955b9cc2868b86e0c207a34b952aac6e8608b7329abc293966e4ac323
SHA512262e30673545c2583b6f5a8525ea4c98e78320fb347de1e9ba3df9620084530256892892c773189dfb3f8989951389b9cb2fd9cf5db4135e151a6446cee03c92