MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9a759f2ef8ee16b697f30aab51fc726f9697b338e0aba56c063860146bbfc76b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Expiro


Vendor detections: 16


Intelligence 16 IOCs YARA File information Comments

SHA256 hash: 9a759f2ef8ee16b697f30aab51fc726f9697b338e0aba56c063860146bbfc76b
SHA3-384 hash: 16da6ae6642b5956e55ef2295f69b5f58fff96f1af359a589d4cbb9e262db489aacc97eb69864d51fb38bef1b7f4d4e1
SHA1 hash: 0d888453df23f50c61abbc8f2216d2fbe986716e
MD5 hash: eb8d251c25ab63697fb69a403af0f09f
humanhash: uranus-lake-arizona-delta
File name:Order SMG 201906 20190816order.pdf.scr
Download: download sample
Signature Expiro
File size:2'267'648 bytes
First seen:2024-11-28 05:39:07 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3d95adbf13bbe79dc24dccb401c12091 (881 x AgentTesla, 737 x FormBook, 236 x SnakeKeylogger)
ssdeep 24576:ktb20p1aCqT5TBWgNQ7aFPXgTcE4K6O6Y22yGhfP+3YR5Qwcb6A2sqjnhMgeiCln:N6g5tQ7aFfarFYY3lu56Dmg27RnWGj
Threatray 1'459 similar samples on MalwareBazaar
TLSH T179A5012263DD8361C3B25273BA5AB741AE7B7C2546B0F96B2FD4093DF820161425FA73
TrID 68.8% (.CPL) Windows Control Panel Item (generic) (57583/11/19)
12.5% (.EXE) Win64 Executable (generic) (10522/11/4)
6.0% (.EXE) Win16 NE executable (generic) (5038/12/1)
5.3% (.EXE) Win32 Executable (generic) (4504/4/1)
2.4% (.EXE) OS/2 Executable (generic) (2029/13)
Magika pebin
File icon (PE):PE icon
dhash icon aae2f3e38383b629 (2'034 x Formbook, 1'183 x CredentialFlusher, 666 x AgentTesla)
Reporter threatcat_ch
Tags:exe Expiro

Intelligence


File Origin
# of uploads :
1
# of downloads :
445
Origin country :
CH CH
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Order SMG 201906 20190816order.pdf.scr
Verdict:
Malicious activity
Analysis date:
2024-11-28 05:42:08 UTC
Tags:
expiro sinkhole autoit m0yv netreactor

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
autorun autoit emotet expiro
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Сreating synchronization primitives
Creating a file in the %AppData% directory
Modifying an executable file
Creating a window
Launching a service
Searching for synchronization primitives
Creating a file in the Windows subdirectories
Modifying a system executable file
Connection attempt to an infection source
Launching a process
Loading a system driver
Modifying a system file
Enabling autorun for a service
Query of malicious DNS domain
Enabling autorun with the shell\open\command registry branches
Infecting executable files
Sending an HTTP POST request to an infection source
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
autoit cmd compiled-script evasive fingerprint keylogger lolbin masquerade microsoft_visual_cc packed packed packer_detected
Result
Threat name:
AgentTesla, MassLogger RAT, PureLog Stea
Detection:
malicious
Classification:
spre.troj.spyw.expl.evad
Score:
100 / 100
Signature
Adds a directory exclusion to Windows Defender
AI detected suspicious sample
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Binary is likely a compiled AutoIt script file
Contains functionality to behave differently if execute on a Russian/Kazak computer
Creates files in the system32 config directory
Drops executable to a common third party application directory
Drops VBS files to the startup folder
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Infects executable files (exe, dll, sys, html)
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queries random domain names (often used to prevent blacklisting and sinkholes)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample uses process hollowing technique
Sigma detected: Drops script at startup location
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: WScript or CScript Dropper
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes data at the end of the disk (often used by bootkits to hide malicious code)
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Generic Downloader
Yara detected MassLogger RAT
Yara detected PureLog Stealer
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1564299 Sample: Order SMG 201906 20190816or... Startdate: 28/11/2024 Architecture: WINDOWS Score: 100 96 reallyfreegeoip.org 2->96 98 zlenh.biz 2->98 100 68 other IPs or domains 2->100 118 Multi AV Scanner detection for domain / URL 2->118 120 Suricata IDS alerts for network traffic 2->120 122 Found malware configuration 2->122 126 21 other signatures 2->126 11 alg.exe 1 2->11         started        16 Order SMG 201906 20190816order.pdf.scr.exe 5 2->16         started        18 elevation_service.exe 2->18         started        20 17 other processes 2->20 signatures3 124 Tries to detect the country of the analysis system (by using the IP) 96->124 process4 dnsIp5 110 yunalwv.biz 208.100.26.245, 49900, 49914, 80 STEADFASTUS United States 11->110 112 lpuegx.biz 82.112.184.197, 49746, 49753, 49766 FIRST_LINE-SP_FOR_B2B_CUSTOMERSUPSTREAMSRU Russian Federation 11->112 116 13 other IPs or domains 11->116 84 123 other malicious files 11->84 dropped 150 Creates files in the system32 config directory 11->150 152 Writes data at the end of the disk (often used by bootkits to hide malicious code) 11->152 154 Drops executable to a common third party application directory 11->154 114 rynmcq.biz 54.244.188.177, 49730, 49731, 49732 AMAZON-02US United States 16->114 72 C:\Windows\System32\alg.exe, PE32+ 16->72 dropped 74 DiagnosticsHub.Sta...llector.Service.exe, PE32+ 16->74 dropped 76 C:\Windows\System32\AppVClient.exe, PE32+ 16->76 dropped 86 5 other malicious files 16->86 dropped 156 Binary is likely a compiled AutoIt script file 16->156 158 Infects executable files (exe, dll, sys, html) 16->158 22 surmit.exe 2 16->22         started        78 C:\Windows\System32\wbengine.exe, PE32+ 18->78 dropped 80 C:\Windows\System32\wbem\WmiApSrv.exe, PE32+ 18->80 dropped 82 C:\Windows\System32\vds.exe, PE32+ 18->82 dropped 88 17 other malicious files 18->88 dropped 160 Found direct / indirect Syscall (likely to bypass EDR) 18->160 162 Windows Scripting host queries suspicious COM object (likely to drop second stage) 20->162 164 Contains functionality to behave differently if execute on a Russian/Kazak computer 20->164 26 surmit.exe 20->26         started        file6 signatures7 process8 file9 68 C:\Users\user\AppData\Roaming\...\surmit.vbs, data 22->68 dropped 140 Binary is likely a compiled AutoIt script file 22->140 142 Drops VBS files to the startup folder 22->142 144 Writes to foreign memory regions 22->144 148 2 other signatures 22->148 28 RegSvcs.exe 22->28         started        146 Sample uses process hollowing technique 26->146 31 surmit.exe 26->31         started        34 RegSvcs.exe 26->34         started        signatures10 process11 file12 90 C:\Users\user\AppData\Local\...\server02.exe, PE32 28->90 dropped 92 C:\Users\user\AppData\Local\...\neworigin.exe, PE32 28->92 dropped 94 C:\Users\user\AppData\Local\...\TrojanAI.exe, PE32 28->94 dropped 36 neworigin.exe 28->36         started        40 TrojanAI.exe 28->40         started        43 server02.exe 28->43         started        166 Binary is likely a compiled AutoIt script file 31->166 168 Writes to foreign memory regions 31->168 170 Maps a DLL or memory area into another process 31->170 45 RegSvcs.exe 31->45         started        signatures13 process14 dnsIp15 102 s82.gocheapweb.com 51.195.88.199, 49738, 49744, 49905 OVHFR France 36->102 104 api.ipify.org 104.26.12.205, 443, 49735 CLOUDFLARENETUS United States 36->104 128 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 36->128 130 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 36->130 132 Tries to steal Mail credentials (via file / registry access) 36->132 138 3 other signatures 36->138 70 C:\Users\user\AppData\...\TrojanAIbot.exe, PE32 40->70 dropped 134 Uses schtasks.exe or at.exe to add and modify task schedules 40->134 136 Adds a directory exclusion to Windows Defender 40->136 47 powershell.exe 40->47         started        50 cmd.exe 40->50         started        52 schtasks.exe 40->52         started        54 TrojanAIbot.exe 40->54         started        106 reallyfreegeoip.org 172.67.177.134, 443, 49737 CLOUDFLARENETUS United States 43->106 108 checkip.dyndns.com 158.101.44.242, 49734, 80 ORACLE-BMC-31898US United States 43->108 56 TrojanAI.exe 45->56         started        file16 signatures17 process18 signatures19 172 Loading BitLocker PowerShell Module 47->172 58 conhost.exe 47->58         started        60 WmiPrvSE.exe 47->60         started        62 conhost.exe 50->62         started        64 timeout.exe 50->64         started        66 conhost.exe 52->66         started        process20
Threat name:
Win32.Virus.Expiro
Status:
Malicious
First seen:
2024-11-27 20:50:28 UTC
File Type:
PE (Exe)
Extracted files:
27
AV detection:
32 of 38 (84.21%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla collection discovery execution keylogger spyware stealer trojan
Behaviour
Checks SCSI registry key(s)
Delays execution with timeout.exe
Modifies data under HKEY_USERS
Scheduled Task/Job: Scheduled Task
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
outlook_office_path
outlook_win_path
Enumerates physical storage devices
Program crash
System Location Discovery: System Language Discovery
Drops file in Program Files directory
Drops file in Windows directory
AutoIT Executable
Drops file in System32 directory
Suspicious use of SetThreadContext
Accesses Microsoft Outlook profiles
Looks up external IP address via web service
Checks computer location settings
Drops startup file
Executes dropped EXE
Loads dropped DLL
Reads WinSCP keys stored on the system
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Command and Scripting Interpreter: PowerShell
AgentTesla
Agenttesla family
Verdict:
Malicious
Tags:
trojan expiro
YARA:
Windows_Virus_Expiro_84e99ff0
Unpacked files
SH256 hash:
abdd6f31a909b0b10e30ced74a1f6f037adf1f61a8a842048dbc254d6f076169
MD5 hash:
c33a7f0e25bb3f4d3c19fc8441e9d12b
SHA1 hash:
0286b277e97b9f7c217a0d029e8144f8e20b40b9
SH256 hash:
a2313a55d0d0db1d0d1b111960452aced849e134d44ce722dd194f62532bff45
MD5 hash:
34bc8b524cb60045cac0941cdd947ad5
SHA1 hash:
86a028a6c53520a4ea2f792d88a93f2b3f47d87f
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24 RedLine_Campaign_June2021
SH256 hash:
36fe89b3218d2d0bbf865967cdc01b9004e3ba13269909e3d24d7ff209f28fc5
MD5 hash:
50d015016f20da0905fd5b37d7834823
SHA1 hash:
6c39c84acf3616a12ae179715a3369c4e3543541
SH256 hash:
53406cb7d67e3d71e30ad41aff5a31b75652624a8641e0ea05f31650abd3fe42
MD5 hash:
d49b97c9900da1344e4e8481551cc14c
SHA1 hash:
53c7014eb195741a40b1d8ca061945fde2aa567f
Detections:
win_masslogger_w0 win_404keylogger_g1 INDICATOR_SUSPICIOUS_EXE_TelegramChatBot MAL_Envrial_Jan18_1 INDICATOR_SUSPICIOUS_Binary_References_Browsers
SH256 hash:
dc441006cb45c2cfac6c521f6cd4c16860615d21081563bd9e368de6f7e8ab6b
MD5 hash:
d6a4cf0966d24c1ea836ba9a899751e5
SHA1 hash:
392d68c000137b8039155df6bb331d643909e7e7
Detections:
AgentTesla win_agent_tesla_g2 INDICATOR_SUSPICIOUS_EXE_Referenfces_File_Transfer_Clients Agenttesla_type2 INDICATOR_SUSPICIOUS_Binary_References_Browsers INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients INDICATOR_EXE_Packed_GEN01 INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store
SH256 hash:
e3fae1b80b581643c61c2d313c825bf7916a686d07cdcbd4debcc9dc8041777c
MD5 hash:
acfa49fcbfae41d1ce5208e85a74d18f
SHA1 hash:
344b938b758ffcdc9c0fd63cc9591f1ee8272472
Detections:
SUSP_OBF_NET_Reactor_Indicators_Jan24
SH256 hash:
f9dd3e52640fc892ef50c0d7e14d9e1e2041ab64dc93b8e8f72be6cc82da042f
MD5 hash:
9ef2f2e3cd1d0a2340a52fc395537209
SHA1 hash:
ce0d6751f65ac84f7843c15f7b6792dae31c8b3f
Detections:
MAL_Malware_Imphash_Mar23_1 MALWARE_Win_RedLine SUSP_OBF_NET_Reactor_Native_Stub_Jan24
SH256 hash:
40869912792e09b180c4d40b84b20677054597b2416ad83c4b0f1243e2b60ed7
MD5 hash:
299fb7f20de2c8e12dec1102b4facf83
SHA1 hash:
c019cb04b5521e1a7c195a55524feb1ffa1715aa
Detections:
AutoIT_Compiled
SH256 hash:
9a759f2ef8ee16b697f30aab51fc726f9697b338e0aba56c063860146bbfc76b
MD5 hash:
eb8d251c25ab63697fb69a403af0f09f
SHA1 hash:
0d888453df23f50c61abbc8f2216d2fbe986716e
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

Expiro

Executable exe 9a759f2ef8ee16b697f30aab51fc726f9697b338e0aba56c063860146bbfc76b

(this sample)

  
Delivery method
Distributed via e-mail attachment

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
CHECK_NXMissing Non-Executable Memory Protectioncritical
CHECK_PIEMissing Position-Independent Executable (PIE) Protectionhigh
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User AuthorizationADVAPI32.dll::AllocateAndInitializeSid
ADVAPI32.dll::CopySid
ADVAPI32.dll::FreeSid
ADVAPI32.dll::GetLengthSid
ADVAPI32.dll::GetTokenInformation
ADVAPI32.dll::GetAce
COM_BASE_APICan Download & Execute componentsole32.dll::CLSIDFromProgID
ole32.dll::CoCreateInstance
ole32.dll::CoCreateInstanceEx
ole32.dll::CoInitializeSecurity
ole32.dll::CreateStreamOnHGlobal
MULTIMEDIA_APICan Play MultimediaWINMM.dll::mciSendStringW
WINMM.dll::timeGetTime
WINMM.dll::waveOutSetVolume
SECURITY_BASE_APIUses Security Base APIADVAPI32.dll::AddAce
ADVAPI32.dll::AdjustTokenPrivileges
ADVAPI32.dll::CheckTokenMembership
ADVAPI32.dll::DuplicateTokenEx
ADVAPI32.dll::GetAclInformation
ADVAPI32.dll::GetSecurityDescriptorDacl
SHELL_APIManipulates System ShellSHELL32.dll::ShellExecuteExW
SHELL32.dll::ShellExecuteW
SHELL32.dll::SHFileOperationW
WIN32_PROCESS_APICan Create Process and ThreadsADVAPI32.dll::CreateProcessAsUserW
KERNEL32.dll::CreateProcessW
ADVAPI32.dll::CreateProcessWithLogonW
KERNEL32.dll::OpenProcess
ADVAPI32.dll::OpenProcessToken
ADVAPI32.dll::OpenThreadToken
WIN_BASE_APIUses Win Base APIKERNEL32.dll::TerminateProcess
KERNEL32.dll::SetSystemPowerState
KERNEL32.dll::LoadLibraryA
KERNEL32.dll::LoadLibraryExW
KERNEL32.dll::LoadLibraryW
KERNEL32.dll::GetDriveTypeW
WIN_BASE_EXEC_APICan Execute other programsKERNEL32.dll::WriteConsoleW
KERNEL32.dll::ReadConsoleW
KERNEL32.dll::SetStdHandle
KERNEL32.dll::GetConsoleCP
KERNEL32.dll::GetConsoleMode
WIN_BASE_IO_APICan Create FilesKERNEL32.dll::CopyFileW
KERNEL32.dll::CreateDirectoryW
KERNEL32.dll::CreateHardLinkW
IPHLPAPI.DLL::IcmpCreateFile
KERNEL32.dll::CreateFileW
KERNEL32.dll::DeleteFileW
WIN_BASE_USER_APIRetrieves Account InformationKERNEL32.dll::GetComputerNameW
ADVAPI32.dll::GetUserNameW
ADVAPI32.dll::LogonUserW
ADVAPI32.dll::LookupPrivilegeValueW
WIN_NETWORK_APISupports Windows NetworkingMPR.dll::WNetAddConnection2W
MPR.dll::WNetUseConnectionW
WIN_REG_APICan Manipulate Windows RegistryADVAPI32.dll::RegConnectRegistryW
ADVAPI32.dll::RegCreateKeyExW
ADVAPI32.dll::RegDeleteKeyW
ADVAPI32.dll::RegOpenKeyExW
ADVAPI32.dll::RegQueryValueExW
ADVAPI32.dll::RegSetValueExW
WIN_USER_APIPerforms GUI ActionsUSER32.dll::BlockInput
USER32.dll::CloseDesktop
USER32.dll::CreateMenu
USER32.dll::EmptyClipboard
USER32.dll::FindWindowExW
USER32.dll::FindWindowW

Comments