Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2024, 14:33 UTC

General

  • Target

    JaffaCakes118_21f6f27f483c56fcab2908422fcb3ee1.exe

  • Size

    535KB

  • MD5

    21f6f27f483c56fcab2908422fcb3ee1

  • SHA1

    cbfc47612d1ffc4b18fef0da883d0d43b9126b73

  • SHA256

    68fe4ddf68cd32aa835a4fe1efd4972f6e76be61e50f44aafc7ec8f33e612553

  • SHA512

    f0bec4c5d8ef6585a33e0d38a4ff75c757a9023fdb2790db363cc016b81784d1f00cf7562039d17ba6c9d546bf7d5ebe97f38ff8e5b8d6f8c9f16372afc77770

  • SSDEEP

    12288:5gbi9I6oqJVNWnwHNneDWcLo7qHY8JgO2:DI3KVLNneacUuHZgO2

Malware Config

Signatures

  • Expiro family
  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_21f6f27f483c56fcab2908422fcb3ee1.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_21f6f27f483c56fcab2908422fcb3ee1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 88
      2⤵
      • Program crash
      PID:584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1996-0-0x000000000114B000-0x00000000011DE000-memory.dmp

    Filesize

    588KB

  • memory/1996-1-0x00000000010C0000-0x00000000011DE000-memory.dmp

    Filesize

    1.1MB

  • memory/1996-2-0x000000000114B000-0x00000000011DE000-memory.dmp

    Filesize

    588KB

  • memory/1996-3-0x00000000010C0000-0x00000000011DE000-memory.dmp

    Filesize

    1.1MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.