Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-01-2025 11:36

General

  • Target

    JaffaCakes118_6c5480888b8b4f86298d76c5e024c560.exe

  • Size

    555KB

  • MD5

    6c5480888b8b4f86298d76c5e024c560

  • SHA1

    46f321cffbc3f4a5690812a0ca082a4a7a9b11a9

  • SHA256

    1c811173caa7fc16558b04b89cb9eac921da745cfd2c88a14633a47bdb6ff12d

  • SHA512

    6fa8d35f92cd0545fa8e7e7015c2230af318d9477336a4a283bc6a93cdb3c2ff6b2cddd37ca56b1c18c4939aabf883b19729dc03442fbc672d892fd207b40658

  • SSDEEP

    12288:TbRRaMMMMM2MMMMM/4pCki40Quwbjbv6+ka61COUAS9Z9oNOtNA1Y:TbRRaMMMMM2MMMMM/44khduwbjbv6+Df

Malware Config

Signatures

  • Expiro family
  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Drops Chrome extension 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 61 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c5480888b8b4f86298d76c5e024c560.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c5480888b8b4f86298d76c5e024c560.exe"
    1⤵
    • Drops Chrome extension
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:1764
  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:1452
  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"
    1⤵
    • Executes dropped EXE
    PID:2324
  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
    "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:2552
  • \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    PID:4768
  • C:\Windows\System32\OpenSSH\ssh-agent.exe
    C:\Windows\System32\OpenSSH\ssh-agent.exe
    1⤵
    • Executes dropped EXE
    PID:4580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe

    Filesize

    2.0MB

    MD5

    e179a5467f31d031334721045b24f462

    SHA1

    701b137a379f02c41423a05dd62368b47bde74b1

    SHA256

    3855bf3b4af8a2dc96caf0875207ea8614b1dce250fc0f9f95c2a5460beeb48e

    SHA512

    2ed60e8da4fed67c304f8dc999f61320663f19373b53e8ad84d24b1aa25960eb864fd1b9227dabc1c12260e548c84b57dd5c10f56b9714cb58dec4af20c38779

  • C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe

    Filesize

    719KB

    MD5

    8cb331476d8f9fc05db0cddb6711c395

    SHA1

    bb2a4b35f284d5c7a2975cebc564ce77c0f8273b

    SHA256

    60a32d85a3d47cd3519647ddfbae28dbf767ddf6e4d239f7489a47c63c0b6fb3

    SHA512

    afe19892d03dbbe45439412a5b49ba8847c90c21c14e31a4312eab3ba6b5641ff794496f5fa309f781c9f316cd8e77f453ebc2f8d44b8d49a895eb277e2a38b1

  • C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE

    Filesize

    736KB

    MD5

    d175ae153412869a81e24fa7ee3d34a5

    SHA1

    89958c0b828a37888149f964c20c638019d8c9e8

    SHA256

    abc00ccd8a65deb8e0a7c5b43a1269ef2f75d26b7ce00a720b182ff180f1bff2

    SHA512

    324c1d9d13702164899a00ed3a3b2881721f3247a83e34879298d3f10b9bc2316cfe10ef106ec1d20c97a41d9a4f07f2941e043b2ba9b86faf3e084653c1058b

  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.vir

    Filesize

    4.5MB

    MD5

    25f730302c92c32cc5880027a9c76a24

    SHA1

    2a3cd87c7720287c31732325334b2aa089a8a2ac

    SHA256

    019882f3a26c94cc11d63ee26efed00e9ec78888bb96a74adc8ee48cbf85559d

    SHA512

    ea7be056daf569925c77ab2d659b009f1a988a9c5dcd8f00f0e6f3c56ae89f8bde1468f7eee884f993c52d4dbcb8909ab5be1d1b7d7d57c87f813cc17a7d49ae

  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe

    Filesize

    2.1MB

    MD5

    a731ed77754bbe0793dec9653caf2984

    SHA1

    5fcf441401fe76b1e21d5b75216c9e614dcaaba0

    SHA256

    8ebe86c16504850b34725515d442229e42e83a5b8c673100a534a221b48bc8e2

    SHA512

    8cdba394e93d1c29deda8ed8ba553b03d5275783a28a0cb23ffb00f14ca72ba7aebdad2fc45c8ab142295b30e14a350b61263d6289fc54cdfec66f330588a5dc

  • C:\Program Files\Internet Explorer\iexplore.exe

    Filesize

    1.3MB

    MD5

    39db3e7700a00615a501ad508ea3f3d1

    SHA1

    6894c5f7cfccf207a9da42c0084b8d2e89fd1dcb

    SHA256

    705b4365276500c5294e3177da8c0ffeacb026226fdbbb33f7f3c3706f3033c3

    SHA512

    dd9e140407e9a81fb112a50d354f3eb363cbddc6a432b6cdf7a7c4b5525a319af9e5cbaba063bfa0dd57c5a4927ad01002fb16cf3ed3ac185da7a64c7c3c0d2a

  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

    Filesize

    919KB

    MD5

    4bf8c86b3f4ed670d596a4f479143078

    SHA1

    a725b4604b5338e9026d51715f8dbdbdaca54f2e

    SHA256

    5d859dac1243b4d3e700fc0fdab0144de28c54af0bd0cf4a2764e7ec106c15e5

    SHA512

    b9d0544fe0e60e0e0e8c5cc7ef281d2c217661f7f4101065378b54a02d77d6707e0fab656bfb31af4585f015261af80a1ab4276e517ba67a621787241c684785

  • C:\Windows\System32\Appvclient.vir

    Filesize

    1.2MB

    MD5

    2274a347c83435082925c21e48643ff1

    SHA1

    ba34be2ef29b506eecfe8740e61dd1e7a7738311

    SHA256

    2e3dcdd72643679ed3f667474fcc78078c9748cd629d952a448c15b16bcd9a23

    SHA512

    08b5ab40146358367b29668b87873d8b5bde337bbc669d2fdc7411e45c4524fd7945a1ab3dbecad67caacdbafa4e8b94d2fae23e5a2d0ed522ffe7e6aa558e27

  • C:\Windows\System32\OpenSSH\ssh-agent.exe

    Filesize

    870KB

    MD5

    6ef625e22a87e6d64ccceb1e7f971162

    SHA1

    d83999eca193085e498b7cba20c4822cfe9c43c6

    SHA256

    67ce47000087fce318367367ddebdf2855184735d1cd3a8208332a94d1989f7f

    SHA512

    9718a8da2a2aba20765a9c7859dcc16cbee4c8a76088530509f25fc003fc8ea882c6e1c3ce69b1c2217c0d8ab05a9c2082b6bedc258fff4486940958aa5a03e1

  • memory/1452-21-0x00000001400B2000-0x00000001400B3000-memory.dmp

    Filesize

    4KB

  • memory/1452-20-0x0000000140000000-0x0000000140374000-memory.dmp

    Filesize

    3.5MB

  • memory/1452-167-0x0000000140000000-0x0000000140374000-memory.dmp

    Filesize

    3.5MB

  • memory/1452-112-0x0000000140000000-0x0000000140374000-memory.dmp

    Filesize

    3.5MB

  • memory/1764-2-0x0000000001000000-0x00000000011B0000-memory.dmp

    Filesize

    1.7MB

  • memory/1764-0-0x0000000001000000-0x00000000011B0000-memory.dmp

    Filesize

    1.7MB

  • memory/1764-1-0x0000000001002000-0x0000000001003000-memory.dmp

    Filesize

    4KB

  • memory/2324-124-0x0000000140000000-0x000000014036B000-memory.dmp

    Filesize

    3.4MB

  • memory/2324-140-0x0000000140000000-0x000000014036B000-memory.dmp

    Filesize

    3.4MB

  • memory/2324-28-0x0000000140000000-0x000000014036B000-memory.dmp

    Filesize

    3.4MB

  • memory/2324-29-0x0000000140000000-0x000000014036B000-memory.dmp

    Filesize

    3.4MB

  • memory/2324-168-0x0000000140000000-0x000000014036B000-memory.dmp

    Filesize

    3.4MB

  • memory/2324-169-0x0000000140000000-0x000000014036B000-memory.dmp

    Filesize

    3.4MB

  • memory/2552-59-0x0000000140000000-0x000000014020F000-memory.dmp

    Filesize

    2.1MB

  • memory/2552-36-0x0000000140000000-0x000000014020F000-memory.dmp

    Filesize

    2.1MB

  • memory/2552-52-0x0000000140000000-0x000000014020F000-memory.dmp

    Filesize

    2.1MB

  • memory/4580-171-0x0000000140000000-0x0000000140242000-memory.dmp

    Filesize

    2.3MB

  • memory/4580-75-0x0000000140000000-0x0000000140242000-memory.dmp

    Filesize

    2.3MB

  • memory/4768-166-0x0000000140000000-0x000000014020F000-memory.dmp

    Filesize

    2.1MB

  • memory/4768-62-0x0000000140000000-0x000000014020F000-memory.dmp

    Filesize

    2.1MB

  • memory/4768-170-0x0000000140000000-0x000000014020F000-memory.dmp

    Filesize

    2.1MB

  • memory/4768-61-0x0000000140000000-0x000000014020F000-memory.dmp

    Filesize

    2.1MB