Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2025 06:29

General

  • Target

    JaffaCakes118_782d5171fa6c6b46bc102c1117991440.exe

  • Size

    923KB

  • MD5

    782d5171fa6c6b46bc102c1117991440

  • SHA1

    ef6881c1c5f5fb4e208240747fcd8c7a62c4643a

  • SHA256

    20e88f5c8107ac6ec0464154d2473ea8f69ac717b045938dbe7ced802fd55666

  • SHA512

    2fe2d4060e66be98536df0da0bf257c80b859593e3894034bf58cfbc3126b845c869e1cb8f7e8bcacfe9a1817b46005008c20a6fb4bfb94df476f882b1f59a23

  • SSDEEP

    24576:JekqcetqSU6A4f0h8dJ3iJHZYS9JY/U5L2J4A6:okqjtqSU6Ah6WfJYui

Malware Config

Signatures

  • Expiro family
  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_782d5171fa6c6b46bc102c1117991440.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_782d5171fa6c6b46bc102c1117991440.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2264-0-0x0000000000400000-0x0000000000622000-memory.dmp

    Filesize

    2.1MB

  • memory/2264-1-0x0000000000414000-0x0000000000415000-memory.dmp

    Filesize

    4KB

  • memory/2264-3-0x0000000000400000-0x0000000000622000-memory.dmp

    Filesize

    2.1MB