Analysis

  • max time kernel
    94s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2025, 16:08

General

  • Target

    JaffaCakes118_7a97f0106b490609755ab1c7d2aa4350.exe

  • Size

    676KB

  • MD5

    7a97f0106b490609755ab1c7d2aa4350

  • SHA1

    8e0dab136f730338ffffa2aa43e9cc3121878255

  • SHA256

    ce5dfe71d8331175ca674979cfd00c8894a4dbd30ffb879fc3f2a9a68e2eb6d6

  • SHA512

    5d8621579c529c424a341bcfb66aaa80a899294e2261756f74a02f78b6779946f2dc0d7472a5443f9a9a0affe00ec7a87186e3e59d7fc00225b00ee9baba7bda

  • SSDEEP

    12288:bcsuGv1kQBjbIsTavDFHbMzG078YkDXq5wNdFKU9oFSA:bh1RjbVTs9O/4YsX5dB

Malware Config

Signatures

  • Expiro family
  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a97f0106b490609755ab1c7d2aa4350.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a97f0106b490609755ab1c7d2aa4350.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:920

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/920-0-0x0000000000400000-0x00000000005D1000-memory.dmp

          Filesize

          1.8MB

        • memory/920-1-0x0000000000408000-0x0000000000409000-memory.dmp

          Filesize

          4KB

        • memory/920-2-0x0000000000400000-0x00000000005D1000-memory.dmp

          Filesize

          1.8MB