Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2025 16:08

General

  • Target

    JaffaCakes118_7a97f0106b490609755ab1c7d2aa4350.exe

  • Size

    676KB

  • MD5

    7a97f0106b490609755ab1c7d2aa4350

  • SHA1

    8e0dab136f730338ffffa2aa43e9cc3121878255

  • SHA256

    ce5dfe71d8331175ca674979cfd00c8894a4dbd30ffb879fc3f2a9a68e2eb6d6

  • SHA512

    5d8621579c529c424a341bcfb66aaa80a899294e2261756f74a02f78b6779946f2dc0d7472a5443f9a9a0affe00ec7a87186e3e59d7fc00225b00ee9baba7bda

  • SSDEEP

    12288:bcsuGv1kQBjbIsTavDFHbMzG078YkDXq5wNdFKU9oFSA:bh1RjbVTs9O/4YsX5dB

Malware Config

Signatures

  • Expiro family
  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a97f0106b490609755ab1c7d2aa4350.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a97f0106b490609755ab1c7d2aa4350.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2764-0-0x0000000000400000-0x00000000005D1000-memory.dmp

    Filesize

    1.8MB

  • memory/2764-1-0x0000000000408000-0x0000000000409000-memory.dmp

    Filesize

    4KB

  • memory/2764-2-0x0000000000400000-0x00000000005D1000-memory.dmp

    Filesize

    1.8MB