Analysis
-
max time kernel
135s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06/03/2025, 00:02
Static task
static1
Behavioral task
behavioral1
Sample
ExodusInject.exe
Resource
win7-20240729-en
General
-
Target
ExodusInject.exe
-
Size
227KB
-
MD5
38b7704d2b199559ada166401f1d51c1
-
SHA1
3376eec35cd4616ba8127b976a8667e7a0aac87d
-
SHA256
153825af8babb75361f4af359bfdd5e95cbdc7f263db5c4e70ac1da8f36bc564
-
SHA512
07b828073c8f80c5498501c8f64decb5effa702c8bc3d60a2f7d5de36d493b469cbbf413fb0c92c0aadd6ee139bfb75f3b9e936230212d42e57d2ec5671e9b27
-
SSDEEP
3072:iBIVzZQgudhV3mypQgbNjcEHBAnpK37nXY8q004Q78ePsi74tyJhbgKL/VoilIBS:Ur3mypQX8mOeP/9/VtLGH+8l
Malware Config
Extracted
xworm
5.0
137.184.74.73:5000
Y2rnj2CSRObOXXLb
-
Install_directory
%ProgramData%
-
install_file
System.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/320-30-0x00000000003C0000-0x00000000003CE000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2172 powershell.exe 2644 powershell.exe -
Deletes itself 1 IoCs
pid Process 2472 cmd.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk AggregatorHost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\System.lnk AggregatorHost.exe -
Executes dropped EXE 4 IoCs
pid Process 320 AggregatorHost.exe 1324 System.exe 2476 System.exe 1892 System.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 848 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2368 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2172 powershell.exe 2644 powershell.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1012 ExodusInject.exe Token: SeBackupPrivilege 2436 vssvc.exe Token: SeRestorePrivilege 2436 vssvc.exe Token: SeAuditPrivilege 2436 vssvc.exe Token: SeDebugPrivilege 2172 powershell.exe Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 320 AggregatorHost.exe Token: SeDebugPrivilege 320 AggregatorHost.exe Token: SeDebugPrivilege 1324 System.exe Token: SeDebugPrivilege 2476 System.exe Token: SeDebugPrivilege 1892 System.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1012 wrote to memory of 2172 1012 ExodusInject.exe 34 PID 1012 wrote to memory of 2172 1012 ExodusInject.exe 34 PID 1012 wrote to memory of 2172 1012 ExodusInject.exe 34 PID 1012 wrote to memory of 2644 1012 ExodusInject.exe 36 PID 1012 wrote to memory of 2644 1012 ExodusInject.exe 36 PID 1012 wrote to memory of 2644 1012 ExodusInject.exe 36 PID 1012 wrote to memory of 2472 1012 ExodusInject.exe 39 PID 1012 wrote to memory of 2472 1012 ExodusInject.exe 39 PID 1012 wrote to memory of 2472 1012 ExodusInject.exe 39 PID 2472 wrote to memory of 848 2472 cmd.exe 41 PID 2472 wrote to memory of 848 2472 cmd.exe 41 PID 2472 wrote to memory of 848 2472 cmd.exe 41 PID 856 wrote to memory of 320 856 taskeng.exe 42 PID 856 wrote to memory of 320 856 taskeng.exe 42 PID 856 wrote to memory of 320 856 taskeng.exe 42 PID 320 wrote to memory of 2368 320 AggregatorHost.exe 43 PID 320 wrote to memory of 2368 320 AggregatorHost.exe 43 PID 320 wrote to memory of 2368 320 AggregatorHost.exe 43 PID 856 wrote to memory of 1324 856 taskeng.exe 45 PID 856 wrote to memory of 1324 856 taskeng.exe 45 PID 856 wrote to memory of 1324 856 taskeng.exe 45 PID 856 wrote to memory of 2476 856 taskeng.exe 46 PID 856 wrote to memory of 2476 856 taskeng.exe 46 PID 856 wrote to memory of 2476 856 taskeng.exe 46 PID 856 wrote to memory of 1892 856 taskeng.exe 47 PID 856 wrote to memory of 1892 856 taskeng.exe 47 PID 856 wrote to memory of 1892 856 taskeng.exe 47 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExodusInject.exe"C:\Users\Admin\AppData\Local\Temp\ExodusInject.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\AggregatorHost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'AggregatorHost.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp3FCE.tmp.bat""2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:848
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
C:\Windows\system32\taskeng.exetaskeng.exe {CA1CBD98-0458-40D4-A9CB-5FB83471E0CE} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Roaming\AggregatorHost.exeC:\Users\Admin\AppData\Roaming\AggregatorHost.exe2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "System" /tr "C:\ProgramData\System.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2368
-
-
-
C:\ProgramData\System.exeC:\ProgramData\System.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
C:\ProgramData\System.exeC:\ProgramData\System.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
C:\ProgramData\System.exeC:\ProgramData\System.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164B
MD5647fff08212bfff02008830e137d0414
SHA14e484746ce479d57bcb492216b232ce1213fe10e
SHA25611334586d91211636d2eb4257fe0ebf67b08b625ae38057f24d1cb2a5553213a
SHA512e7b32253f6ef4f2f4bf049360c989da7e394c72c62e460cdd7f23682c06c920878d02bfa9728081626344fc7c95a78076b1967575a170f41752759e514aa28ee
-
Filesize
227KB
MD538b7704d2b199559ada166401f1d51c1
SHA13376eec35cd4616ba8127b976a8667e7a0aac87d
SHA256153825af8babb75361f4af359bfdd5e95cbdc7f263db5c4e70ac1da8f36bc564
SHA51207b828073c8f80c5498501c8f64decb5effa702c8bc3d60a2f7d5de36d493b469cbbf413fb0c92c0aadd6ee139bfb75f3b9e936230212d42e57d2ec5671e9b27
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5f54d1eeb70629c149ac041f8bfb3785a
SHA14019f4af701d418bf24f201ee160776210e7e20f
SHA256c528cd945b1664de4e4165079bdf5351b44bddd6276b9b7f3167d9140ffb944a
SHA512d377ce00fb634149943d47d9b91214e86377e446ba0ef2bec013bdc1e85a5cb2f426d7b29a428356d74036348a0174eb44de52cdf865d4faaba192f6fe9f7cc9