Skip to content

S0343 Exaramel for Windows

Exaramel for Windows is a backdoor used for targeting Windows systems. The Linux version is tracked separately under Exaramel for Linux.1

Item Value
ID S0343
Associated Names
Type MALWARE
Version 2.2
Created 30 January 2019
Last Modified 26 March 2023
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
enterprise T1560 Archive Collected Data Exaramel for Windows automatically encrypts files before sending them to the C2 server.1
enterprise T1059 Command and Scripting Interpreter -
enterprise T1059.003 Windows Command Shell Exaramel for Windows has a command to launch a remote shell and executes commands on the victim’s machine.1
enterprise T1059.005 Visual Basic Exaramel for Windows has a command to execute VBS scripts on the victim’s machine.1
enterprise T1543 Create or Modify System Process -
enterprise T1543.003 Windows Service The Exaramel for Windows dropper creates and starts a Windows service named wsmprovav with the description “Windows Check AV.”1
enterprise T1074 Data Staged -
enterprise T1074.001 Local Data Staging Exaramel for Windows specifies a path to store files scheduled for exfiltration.1
enterprise T1036 Masquerading -
enterprise T1036.004 Masquerade Task or Service The Exaramel for Windows dropper creates and starts a Windows service named wsmprovav with the description “Windows Check AV” in an apparent attempt to masquerade as a legitimate service.1
enterprise T1112 Modify Registry Exaramel for Windows adds the configuration to the Registry in XML format.1
enterprise T1027 Obfuscated Files or Information -
enterprise T1027.011 Fileless Storage Exaramel for Windows stores the backdoor’s configuration in the Registry in XML format.1

Groups That Use This Software

ID Name References
G0034 Sandworm Team 1

References