Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    02-01-2025 13:39

General

  • Target

    JaffaCakes118_657e840c027a6c8eaf958cee20ebaf2d.exe

  • Size

    406KB

  • MD5

    657e840c027a6c8eaf958cee20ebaf2d

  • SHA1

    eec553924c9cae436a0170b2d3cbf9d5321242c0

  • SHA256

    5483834382781507cda0a37caa8ee98a0b48166d7db5dc040bfcc19c41212628

  • SHA512

    4e7231d37805c3a1df853cb71b75c4e9705db2857859c6bc22afd2d04343473e70be0ff9a5707ab3ee3cca09469260c116deef2272a5c90db35482787484eadd

  • SSDEEP

    12288:dvqlqSrzEAupLiPuSrN0rMaAg74Z/R2/6LM/5OPOOYp+Bb:JsqSroAupL8uSrOrMXfbPOOC+B

Malware Config

Signatures

  • Expiro family
  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 3 IoCs
  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops Chrome extension 1 IoCs
  • Enumerates connected drives 3 TTPs 42 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 36 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 27 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_657e840c027a6c8eaf958cee20ebaf2d.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_657e840c027a6c8eaf958cee20ebaf2d.exe"
    1⤵
    • Drops Chrome extension
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1952
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2140
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    PID:1644
  • C:\Windows\system32\dllhost.exe
    C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
    1⤵
    • Drops file in Windows directory
    PID:2848
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2636
  • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    • Windows security modification
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.vir

    Filesize

    336KB

    MD5

    7b20219cb99a6690b228af9f23567313

    SHA1

    edbadfbfee8f68a75eff2d2a8a5119ef9f83a54f

    SHA256

    a4dceb4d2f19a87d3623f16d6437e4a1f539a17c56894b3562a55c59d8a1cd76

    SHA512

    c6db8cf11add78bd1f65a7d609f29875cc3c8c2bdc928a5598e24f32cbf1f5ba950e55d1cdee72efe791ae78611f9feb1cc188f4c0c392550afb7923df915f23

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe

    Filesize

    1.2MB

    MD5

    4bfd6f6d9710c8ecb950a0dd4b910073

    SHA1

    61572fc28fad621c6eb471b669437628c180b14d

    SHA256

    d639933800fd06d55803eeed236d42cc22fb1ad76dbc0f11a0e9b2db466a3608

    SHA512

    21bedca862a32a9572a34a1e2002920bbb0b7eddabc0d61f080a49b858fd1d1f7821e378e6c472655b690184c1df360d0fcc41af334591ec39ba3470b9ffb006

  • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

    Filesize

    336KB

    MD5

    7f8105844082d85f958b946987bfc491

    SHA1

    6d7eb0b9ad95781b7df88bdd1c99fb9ecdb99428

    SHA256

    87369fe0bcce404ca5b0f57abf713cc643edfdf4dad3fba381a3f46436f1cac1

    SHA512

    a63c672c740bb805f09aad008fa4b549d18dd8a4a4f92fab27be14aee7ff60689a632d7309a57ede91a9f0bdb97d8fe3ca5fb6cd09ff38ee2c99c40d4a30957f

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    255KB

    MD5

    a9a58a2c20ab0a65f0f6a95c43d5af96

    SHA1

    8247a0f1d8b101a6985ae459b66b00b73469195b

    SHA256

    a227c0adad758512e0ec690f40faf590c8d53d132b68ad833e618a5821b44904

    SHA512

    327524d92ef8dd535c81fb1a5a4757dfc48ed65e3babb1d164514b41241e7e212b1b0d2cf7173ae4d5fa7c9d76540a12cae1cf0512dc86a4e1a7a34c7a3c05b0

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

    Filesize

    1003KB

    MD5

    39594ebf4e3a4e86d7a91646c51c8ab2

    SHA1

    5a10c26d475851e0f665e9aa47dabc8060f4c783

    SHA256

    7e11887d6b2c186eaccc303ec3e488dddcdef8d475989fb2de59a8296398521e

    SHA512

    f1983c0179f5a8cbf5bfdcc2b90ba391387a62761f35e27ba9714c6a735216970aa9b3b619671e77d3e2957881dbac776a5d8c5ad48f5e112cb7ef8fcc410a91

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    286KB

    MD5

    98cfa01965cc88447af5c00ba953e81e

    SHA1

    24b9677d89301df8ace922256150966d44f11892

    SHA256

    2b871d24a13459e829f42da34d3eb00392e0baa3201835c2ff452ea95b21a3af

    SHA512

    b67485d7fce1ef0c4b5ad51f11a891f3095edd4dce22624a3dff120357887fac6cb42951911d61a3b546a82e88400b65690db8c8e262abc74be8ae73cdaedc79

  • \??\c:\program files (x86)\microsoft office\office14\groove.exe

    Filesize

    29.7MB

    MD5

    0f0e6c9f3d3039ca458ce7e42ccc1c5a

    SHA1

    71a4e8f00b466ab5a402a5147eb2c3d771f73ae9

    SHA256

    9a117f2f4ca9af1c98f5f74c5391b0ca14063f048d3ecd56bc69e8f3bfc86946

    SHA512

    c70a826fc7dec6ddd0bf1ac9f6797afbeb9515feb1824b86a94e9a3eba26b9867d0879b7e1b5be41eeed7001255173a872cb6f464dd24ec670168ef066a36724

  • \??\c:\windows\SysWOW64\searchindexer.exe

    Filesize

    614KB

    MD5

    af431825feda030cad1573bb6f3f08ef

    SHA1

    d3c33e30394f81084da4d7558e4702904925120d

    SHA256

    7e7752d35e08874cebbf9b43c6a95dd71f9352ea819bfce26f060df7727f625a

    SHA512

    db27c37e5cc5daa84a9d7fa141edc99b265592b26b00c5d23cc0736c97f1127cd9aa1c1222f1f11585cb692d1abee1aefab8acfaf8c0595fbc751cbeffbadece

  • \??\c:\windows\SysWOW64\svchost.exe

    Filesize

    216KB

    MD5

    61074e48b661bc8ac4aa06d6361c8d46

    SHA1

    b5800256f7225c4cf854ebead20eb7a97098ea67

    SHA256

    1a7e5de3d50d75303003889d420bea0e615dff7a55ea622600f9cbe0cc361a5a

    SHA512

    60745fe30fe7615c5d781bb384cd0fab607e8053cbc84058835982d6ac6b74447e920f7ea5cc53e7715f4e745d2e6f4fad89fff4f0ef0126ca7ef3e50f7c78fd

  • memory/1644-25-0x0000000000400000-0x000000000056A000-memory.dmp

    Filesize

    1.4MB

  • memory/1952-0-0x0000000001000000-0x0000000001186000-memory.dmp

    Filesize

    1.5MB

  • memory/1952-2-0x0000000001000000-0x0000000001186000-memory.dmp

    Filesize

    1.5MB

  • memory/1952-1-0x000000000101A000-0x000000000101B000-memory.dmp

    Filesize

    4KB

  • memory/2140-13-0x0000000010000000-0x0000000010161000-memory.dmp

    Filesize

    1.4MB

  • memory/2140-27-0x0000000010000000-0x0000000010161000-memory.dmp

    Filesize

    1.4MB

  • memory/2140-14-0x000000001000C000-0x000000001000D000-memory.dmp

    Filesize

    4KB

  • memory/2248-67-0x000000002E000000-0x000000002E177000-memory.dmp

    Filesize

    1.5MB

  • memory/2248-46-0x000000002E013000-0x000000002E015000-memory.dmp

    Filesize

    8KB

  • memory/2248-45-0x000000002E000000-0x000000002E177000-memory.dmp

    Filesize

    1.5MB