Analysis

  • max time kernel
    144s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    03/07/2024, 22:10

General

  • Target

    213da720fe5ecdc950445fe44e3f585b_JaffaCakes118.exe

  • Size

    60KB

  • MD5

    213da720fe5ecdc950445fe44e3f585b

  • SHA1

    3622c4d856a1628d68eaf52eb1bf4a0815a6b817

  • SHA256

    a57aa42b392124188716088c90835ba9c708edbbbb017cb009c6819643f50f42

  • SHA512

    5878b4113fe6a41c0e4e66df091af57e8f1b192253bc235f41d9413a49836866acc25501ef6b9b7af685cb0d7937a1622a064cfeb4996c81e1e95dbb98088d48

  • SSDEEP

    768:0E30e/7tEaWcArSwaydTb0EroSd3QXGsBS4sZFFSUv6GfEK+RsWW2qTN4lvCy2ZL:F+PeXonnUStQXDI4spvVp+N8NECtH3T

Malware Config

Signatures

  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 5 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\213da720fe5ecdc950445fe44e3f585b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\213da720fe5ecdc950445fe44e3f585b_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Users\Admin\AppData\Local\Temp\213da720fe5ecdc950445fe44e3f585b_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\213da720fe5ecdc950445fe44e3f585b_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2988
      • C:\Windows\SysWOW64\service114.exe
        -n
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2180
        • C:\Windows\SysWOW64\service114.exe
          -n
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Enumerates connected drives
          • Modifies WinLogon
          PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\service114.exe

    Filesize

    60KB

    MD5

    213da720fe5ecdc950445fe44e3f585b

    SHA1

    3622c4d856a1628d68eaf52eb1bf4a0815a6b817

    SHA256

    a57aa42b392124188716088c90835ba9c708edbbbb017cb009c6819643f50f42

    SHA512

    5878b4113fe6a41c0e4e66df091af57e8f1b192253bc235f41d9413a49836866acc25501ef6b9b7af685cb0d7937a1622a064cfeb4996c81e1e95dbb98088d48

  • memory/2180-41-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2180-29-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2656-47-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2656-44-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2656-45-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2912-12-0x0000000000280000-0x00000000002A4000-memory.dmp

    Filesize

    144KB

  • memory/2912-10-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2912-0-0x0000000000400000-0x0000000000424000-memory.dmp

    Filesize

    144KB

  • memory/2988-7-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2988-5-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2988-17-0x00000000002F0000-0x0000000000314000-memory.dmp

    Filesize

    144KB

  • memory/2988-28-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2988-14-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2988-13-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2988-9-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2988-3-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2988-1-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB