Analysis

  • max time kernel
    150s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2025, 01:18

General

  • Target

    7c9966301ef6631298ddcc0d8ef36d7df2464cdaa9217b6ec1ec686c740b37f6.exe

  • Size

    772KB

  • MD5

    68029b2bf01d687a4661d4b61a2f0740

  • SHA1

    b9431ba2ae320295935f70a68764c387a9450411

  • SHA256

    7c9966301ef6631298ddcc0d8ef36d7df2464cdaa9217b6ec1ec686c740b37f6

  • SHA512

    1c7f5ab2bad06d24f2b49a8c6b34f60954aabd9abfc2d879c6b1eda7614c4f044bbb6262f015f2ed421e4966b06bf9c693ca854ba17146e7c33830984ea689c0

  • SSDEEP

    24576:mVzwix9dfixVZ1L61ePrXxW4T0tfEEL0uX:eDNfixU12TxcxEEY

Malware Config

Signatures

  • Expiro family
  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 2 IoCs
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Drops Chrome extension 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 61 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 20 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c9966301ef6631298ddcc0d8ef36d7df2464cdaa9217b6ec1ec686c740b37f6.exe
    "C:\Users\Admin\AppData\Local\Temp\7c9966301ef6631298ddcc0d8ef36d7df2464cdaa9217b6ec1ec686c740b37f6.exe"
    1⤵
    • Drops Chrome extension
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:5012
  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:640
  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:4576
  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
    "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
    1⤵
    • Executes dropped EXE
    PID:3092
  • \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    PID:1892
  • C:\Windows\System32\OpenSSH\ssh-agent.exe
    C:\Windows\System32\OpenSSH\ssh-agent.exe
    1⤵
    • Executes dropped EXE
    PID:5032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe

    Filesize

    2.1MB

    MD5

    b99b6787482913f0ea6ea1376c769a2a

    SHA1

    cda5174c9b6e1de2f7eb002247e3c442095461c8

    SHA256

    f56e10ede5db4e99ee1fe3fa7c5d932c66a3388842c2df4dc68ba0317c3f8048

    SHA512

    67645a9193847729e45f4ea26a15c4715e49f901b3e1c39b5787cdf93e7617db01dcec89dde0562265dc56d50d6c6372a924c72c0cdc01e3d40faf764d72729e

  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

    Filesize

    805KB

    MD5

    4a72f51a277091600d0b28feb36f889c

    SHA1

    90476b7960de52ff6847b2d8f2d5a86b583df20c

    SHA256

    3a95695f0e0f120781a5ebad9f0a9190b8c92dfc33369e402d3eb212c42a9054

    SHA512

    1f0846cbb88193929c4e368457b6d30401ce609df577179eccc5813842d8146f3bde0993b5e0004e6b87959128661d3736965f7994ffe85aecd64609bb228fc8

  • C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE

    Filesize

    821KB

    MD5

    78f05aaf34c0287f48774b6d9ad8ff50

    SHA1

    f7868ae93c68bec42dfbf55b0c9138fc15908cb6

    SHA256

    ca19a18eb8a6e4dfa6ec7e0cccc3f5dcbad541f86bc310f71a74bf0f079db2c1

    SHA512

    49d79bcb3c7552a5296bd9d87bd5e0687053f5f8c0a0652a55a1fbdfcaa728a66a1a130ddcadb6398ef5d821ddecb46fde5582cd12e26021778d8566c6501bf3

  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\cpkcoelj.tmp

    Filesize

    4.6MB

    MD5

    704d775255ff02e52524c97e8789f527

    SHA1

    8fd441a4093cf86787b09aa942742939cb9f10c1

    SHA256

    a0c9848ff3a4184065a716cf221dcee81154492e5be0bddb419510244b1886ed

    SHA512

    1b64e41ac812b793ccffe188c6283998a9ff131c49386d557a699a43efa2a25dbfaeada773e49da76a4ccb18e8d915578e65568f71e370137b95c2bf0f45effe

  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe

    Filesize

    2.2MB

    MD5

    020aeb6b4f19c5eb57283fa9453691a9

    SHA1

    f6919cb2928e385538a4de38ff64290a23d42e8a

    SHA256

    ca5b13316efc9750d0f2bd7923b05add0ee4abfbf499a6aa7744f0ee18ff83f4

    SHA512

    89860a05fe98eb870ddce5baa9e42abb7068c14f8c997e7f96506f8d6a29a391f649a0cbf98bcdbe5fb59e672b7ff986ddd0a985f52a179496265bd607114655

  • C:\Program Files\Internet Explorer\iexplore.exe

    Filesize

    1.4MB

    MD5

    03f2fef32c2b035739fad16fa55fdb71

    SHA1

    52f2eb53df62ab94b6b5e56dc716a59fbd4ab9a8

    SHA256

    8b2f05714977e39add2fcfadda82eb96dd844141398608463fa4f4462a2f1a59

    SHA512

    ce0a265b50c69bfa26ac1880ad44c9210d5840729852e8d480ed3fab791f3fb9eca3f7d471a7337e551a583e7a4824dd232b032308cad7fd3cce575a115be03d

  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

    Filesize

    1002KB

    MD5

    809159d6fe0f975d5e8cd5558acedf1a

    SHA1

    35bb2794d6eb081154becf477e11a699dbb6e2fb

    SHA256

    cedcd06a9479642634dc87c48bfb079bdff7becb4cab3d697b8b4c82f56d277b

    SHA512

    392e3b2d7ffdea75674284046ccc71633f680bb975c70f5d1530d1d01cbd8b1bdab20421aae43aa7d97cade7f1517881984171abb12df124f324972061ca71ef

  • C:\Windows\System32\OpenSSH\ssh-agent.exe

    Filesize

    956KB

    MD5

    4b1f7dffa5776a14c6f61fba688dd807

    SHA1

    44888ae82d3c4c39b2f44ddc9efdb5c3da9298d2

    SHA256

    2f43ed82bbf147bc3d62a4e56575af412d9f66f16888f5158e52b326e98f0590

    SHA512

    74d85252435466569071cbb443d7737e7d5b5b0a727d16cbaa22d4e5cd587fbf54a76bbb8479864322341095d95da7326c4bdddfdd8037b9195189f97ebf1378

  • memory/640-21-0x0000000140000000-0x0000000140428000-memory.dmp

    Filesize

    4.2MB

  • memory/640-22-0x00000001400B2000-0x00000001400B3000-memory.dmp

    Filesize

    4KB

  • memory/640-161-0x0000000140000000-0x0000000140428000-memory.dmp

    Filesize

    4.2MB

  • memory/640-116-0x0000000140000000-0x0000000140428000-memory.dmp

    Filesize

    4.2MB

  • memory/1892-61-0x0000000140000000-0x00000001402C3000-memory.dmp

    Filesize

    2.8MB

  • memory/1892-162-0x0000000140000000-0x00000001402C3000-memory.dmp

    Filesize

    2.8MB

  • memory/3092-37-0x0000000140000000-0x00000001402C3000-memory.dmp

    Filesize

    2.8MB

  • memory/3092-59-0x0000000140000000-0x00000001402C3000-memory.dmp

    Filesize

    2.8MB

  • memory/4576-145-0x0000000140000000-0x000000014041F000-memory.dmp

    Filesize

    4.1MB

  • memory/4576-30-0x0000000140000000-0x000000014041F000-memory.dmp

    Filesize

    4.1MB

  • memory/4576-144-0x0000000140000000-0x000000014041F000-memory.dmp

    Filesize

    4.1MB

  • memory/4576-29-0x0000000140000000-0x000000014041F000-memory.dmp

    Filesize

    4.1MB

  • memory/4576-169-0x0000000140000000-0x000000014041F000-memory.dmp

    Filesize

    4.1MB

  • memory/4576-168-0x0000000140000000-0x000000014041F000-memory.dmp

    Filesize

    4.1MB

  • memory/5012-0-0x0000000000400000-0x0000000000688000-memory.dmp

    Filesize

    2.5MB

  • memory/5012-4-0x0000000000400000-0x0000000000688000-memory.dmp

    Filesize

    2.5MB

  • memory/5012-1-0x000000000040C000-0x000000000040D000-memory.dmp

    Filesize

    4KB

  • memory/5032-74-0x0000000140000000-0x00000001402F6000-memory.dmp

    Filesize

    3.0MB

  • memory/5032-175-0x0000000140000000-0x00000001402F6000-memory.dmp

    Filesize

    3.0MB