Analysis
-
max time kernel
94s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 11:57
Static task
static1
Behavioral task
behavioral1
Sample
7ee11f85e1380cc197c7f86485756207e10e5aaa59f9646dae981641113ff2a5N.exe
Resource
win7-20241010-en
General
-
Target
7ee11f85e1380cc197c7f86485756207e10e5aaa59f9646dae981641113ff2a5N.exe
-
Size
927KB
-
MD5
797c53ab8096a9a97d91bd8b4b25aea0
-
SHA1
36f56d955c6bcf22b4d6391b61af1c6754b3d29a
-
SHA256
7ee11f85e1380cc197c7f86485756207e10e5aaa59f9646dae981641113ff2a5
-
SHA512
ea1a7512e42361aa6d08b8107e15a3419e0de4c8fdb8f96f2473dc3279f46ef010fa46fc8910d57a4e3b214b0f7da0e3bbb6241bcf0181978a722d63c5bc05f8
-
SSDEEP
24576:RjkqcetqSd1ELP34MYTNvyvzEYoo+iiNuZXL:xkqjtqSDELPYsbH
Malware Config
Signatures
-
Expiro family
-
Expiro payload 1 IoCs
resource yara_rule behavioral2/memory/4224-3-0x0000000000400000-0x00000000006B6000-memory.dmp family_expiro1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 7ee11f85e1380cc197c7f86485756207e10e5aaa59f9646dae981641113ff2a5N.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\Temp AdobeARM.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\Backup AdobeARM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ee11f85e1380cc197c7f86485756207e10e5aaa59f9646dae981641113ff2a5N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeARM.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4224 7ee11f85e1380cc197c7f86485756207e10e5aaa59f9646dae981641113ff2a5N.exe 4224 7ee11f85e1380cc197c7f86485756207e10e5aaa59f9646dae981641113ff2a5N.exe 4224 7ee11f85e1380cc197c7f86485756207e10e5aaa59f9646dae981641113ff2a5N.exe 4224 7ee11f85e1380cc197c7f86485756207e10e5aaa59f9646dae981641113ff2a5N.exe 4224 7ee11f85e1380cc197c7f86485756207e10e5aaa59f9646dae981641113ff2a5N.exe 4224 7ee11f85e1380cc197c7f86485756207e10e5aaa59f9646dae981641113ff2a5N.exe 4224 7ee11f85e1380cc197c7f86485756207e10e5aaa59f9646dae981641113ff2a5N.exe 4224 7ee11f85e1380cc197c7f86485756207e10e5aaa59f9646dae981641113ff2a5N.exe 4224 7ee11f85e1380cc197c7f86485756207e10e5aaa59f9646dae981641113ff2a5N.exe 4224 7ee11f85e1380cc197c7f86485756207e10e5aaa59f9646dae981641113ff2a5N.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4180 AdobeARM.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4224 wrote to memory of 4180 4224 7ee11f85e1380cc197c7f86485756207e10e5aaa59f9646dae981641113ff2a5N.exe 82 PID 4224 wrote to memory of 4180 4224 7ee11f85e1380cc197c7f86485756207e10e5aaa59f9646dae981641113ff2a5N.exe 82 PID 4224 wrote to memory of 4180 4224 7ee11f85e1380cc197c7f86485756207e10e5aaa59f9646dae981641113ff2a5N.exe 82 PID 4180 wrote to memory of 2820 4180 AdobeARM.exe 91 PID 4180 wrote to memory of 2820 4180 AdobeARM.exe 91 PID 4180 wrote to memory of 2820 4180 AdobeARM.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ee11f85e1380cc197c7f86485756207e10e5aaa59f9646dae981641113ff2a5N.exe"C:\Users\Admin\AppData\Local\Temp\7ee11f85e1380cc197c7f86485756207e10e5aaa59f9646dae981641113ff2a5N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"2⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"3⤵PID:2820
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
358B
MD59590ba87d292bfd6e8ebaeedcf3d9e7d
SHA1ea320f78551c0fe4217f1c00c3910fef75527ad6
SHA256ecf52bb638cd944b0f9c8ae373a5bcde837c741a1715bb4f5bdde28b40131055
SHA512157027e8d5a6a9e54142f5e28608d26f095ba1c26a74ccbc2486c4ec32a82cfb271807cae321ce9cb1a3a3a7f86f33e5646ff5edc6147857539cb84af4855691
-
Filesize
251KB
MD5864c22fb9a1c0670edf01c6ed3e4fbe4
SHA1bf636f8baed998a1eb4531af9e833e6d3d8df129
SHA256b4d4dcd9594d372d7c0c975d80ef5802c88502895ed4b8a26ca62e225f2f18b0
SHA512ff23616ee67d51daa2640ae638f59a8d331930a29b98c2d1bd3b236d2f651f243f9bae38d58515714886cfbb13b9be721d490aad4f2d10cbba74d7701ab34e09
-
Filesize
3KB
MD5bbb796dd2b53f7fb7ce855bb39535e2f
SHA1dfb022a179775c82893fe8c4f59df8f6d19bd2fd
SHA256ff9b4cf04e3202f150f19c1711767361343935da7841c98b876c42fd2cabce9b
SHA5120d122f454fcbf4524c2756692f0f33dc98f5bd2426839c6f03cd5c5f4fd507a8a15cf489d7a7ceadd1b95cf31b506c04bf03d613a9ba7d76add92766b1dc5c2b
-
Filesize
3KB
MD5ec946860cff4f4a6d325a8de7d6254d2
SHA17c909f646d9b2d23c58f73ec2bb603cd59dc11fd
SHA25619fe53c801ad7edc635f61e9e28d07da31780c2480e6f37ecfc63fffe1b250fe
SHA51238a98b18dbae063bc533a1ff25a3467a7de197651e07e77a1b22cf8ce251282ab31f61dcff5c51ef186cfd115dc506181d480eabffbe92af01dee6282cbee13e
-
Filesize
3KB
MD5fc2430057cb1be74c788f10c2d4540c8
SHA1cab67ee8d5191fbf9f25545825e06c1a822af2f2
SHA256dcc9d2695125406282ba990fec39403c44b12964acf51b5e0dc7f2080d714398
SHA5124e2b9709a9e3ca5173abb35816e5a0aebbf2a7aaf971d7f75f3ae66e4a812cbade103baa5016525f5ab83a60c18f8d3c278c90ff83e4afdae419f81673cb5aee
-
Filesize
3KB
MD5a58599260c64cb41ed7d156db8ac13ef
SHA1fb9396eb1270e9331456a646ebf1419fc283dc06
SHA256aabf92089e16fdb28706356dbc4efb5a81f5277946f2e67695b31676616ed2d2
SHA5126970cbc42e7ec64ccdb8e5633b7017b1e9ec0d4ad094869e221e9275b814b1442b84827996190159543bdb5e86df6885c45197c533d657db4660fca8ad761a71