Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09/01/2025, 14:28 UTC

General

  • Target

    JaffaCakes118_ca89a4a95e02c983d0dea4f436b1b6cb.exe

  • Size

    415KB

  • MD5

    ca89a4a95e02c983d0dea4f436b1b6cb

  • SHA1

    4c470783ac069be6c346de512d6cf5d41032e1c1

  • SHA256

    baf5cc82467581211e49787174cfa5eb4c88db90b94a221b8a2647f830fcd6e2

  • SHA512

    ca49e0cc427d0543ad766ababc63f76fdf0ac174f1343f3c37377c4c4f17f5cc41763794d0feda51e1b3b87cc89a62a422e1821df79372cc5f152bea7fcc7a33

  • SSDEEP

    12288:Hr8yKsihyU4otoUr05sbR4XQuwRfzE6UgfcA:Hr8yKsioU42nhbqQuwLfD

Score
10/10

Malware Config

Signatures

  • Expiro family
  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ca89a4a95e02c983d0dea4f436b1b6cb.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ca89a4a95e02c983d0dea4f436b1b6cb.exe"
    1⤵
      PID:2272

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2272-0-0x000000000015B000-0x00000000001EE000-memory.dmp

      Filesize

      588KB

    • memory/2272-2-0x000000000015B000-0x00000000001EE000-memory.dmp

      Filesize

      588KB

    • memory/2272-1-0x00000000000F0000-0x00000000001EE000-memory.dmp

      Filesize

      1016KB

    • memory/2272-3-0x00000000000F0000-0x00000000001EE000-memory.dmp

      Filesize

      1016KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.