Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2025 16:31

General

  • Target

    JaffaCakes118_2355177446aeaf352cd26eb1777d2b77.exe

  • Size

    1.0MB

  • MD5

    2355177446aeaf352cd26eb1777d2b77

  • SHA1

    5e9c708bd0b6243d359cfd8ae05852c653f78b4c

  • SHA256

    22fc47f1b692f036a6d0ba6d9547192ed9aba1adba5c77d87d1b51ecb9c7a5e8

  • SHA512

    bee1dd157333b2aaa3281dbd6e2bec5a8171e6c85bf45b4d9bf56b3d3d9f576ccb30711d49be24eac459bbee300fc49f38b6d19ceda8860963d8860d9bd565e4

  • SSDEEP

    24576:clabsM8KGH7Co0OLeGrIocE5lArjPP5999O:cl08KGbNLeGMb4unBk

Malware Config

Signatures

  • Expiro family
  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2355177446aeaf352cd26eb1777d2b77.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2355177446aeaf352cd26eb1777d2b77.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\active~1.htm

    Filesize

    1KB

    MD5

    eb567b646af843f620897b6d6052213c

    SHA1

    12c2624caaa138a394f3c4699936384abee86765

    SHA256

    ce0ebcd75f77ef71b4b3cdd5b5b30c4bc218053980e48f72fa03e793087ba695

    SHA512

    430ab18720bfbfeac9d58aa72ddb738395ed0a942f1d48617c607d19762640276d0f7e632e5cc947630883b136f30d58bcde4255412a0c7a818b15abc85db920

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\config.xml

    Filesize

    513B

    MD5

    3713b5a27a4f3ba2f92909cb06860b59

    SHA1

    c4fa51fd0e0695399bbe0cf8a7572f5603657982

    SHA256

    d5d35ccf45b39d60f0b24a11bbb74c9106491daf1f78282d77996deccbc85e1a

    SHA512

    4237a3dbd7c2c5edb3f216f3c54fc18b41a588a2f6a8f3a7bf2ad985981ce16ef5abce83702e272a24a9fe8f0eab7e6c5ab20c2f5e59a11f28c0cb41cc17496d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\data.xml

    Filesize

    200B

    MD5

    06b00ba6c22ffb816174aef7ce85b15a

    SHA1

    b550295cc386901b91977d9d578d07c2fa2f7455

    SHA256

    cde78665284b4805b4df790ea7b52397cb9c5edb49e6082f2e24c3b1f0293d5d

    SHA512

    66d0ebb2cf471f120c30dc6474c3699c38482790528355eb520edec3e4ad348906db99cc05558b15814af74abe2126c5e0f001bd350ab3f4a571e2565f6211a0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fngrprnt.dll

    Filesize

    8KB

    MD5

    470123d0d53d2a260719025893400928

    SHA1

    748b42dff8d8d789ee314758d17abaeace364244

    SHA256

    c28feffe76ba4ae036779bf2c04d5e0a8a6a9e5db6cf60d7de861be982f96145

    SHA512

    80502190a71566f9093284538a1c4d1a9ac24f4bd09746e9041b1b448c44c97d672705edc188516d21374bbd7bea55ab5a19ac134959aa3a0065e9d58b06676f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\mega.gif

    Filesize

    13KB

    MD5

    1f0214c1b824e220659ab47daad70a01

    SHA1

    d8bee9601beecb95d10b695f9c74870c7efe15ec

    SHA256

    996b90cc452995b5f72108dd1925c9883552c6d6de00d79f43f2fc3268a3b017

    SHA512

    f36fb95e83cac126a9527c6394fe03cb65efeb8a9232ddfad64d3af13b753f45d8571849c42f0e446f8fa22aad3218b9fe51dad7b3602356f2befa1752d30e8f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\messen~1.xml

    Filesize

    257B

    MD5

    e5ee60c6913bc24f8003a2a266bd1b8c

    SHA1

    add44935a19613b43bd729d7c694d8381794a0e3

    SHA256

    583bf347c2665ba1a80a6189d59606eeac2e09fe54b6428357059011839aeeca

    SHA512

    eeee04d280c68bccb30d50795b5ef5c036ce6d323de84750621c12d151109eb95d6a385076f3de8c58a232449d192e499cc29c57e302acf2224dff1d9e7ab93d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\msnphoto.scr

    Filesize

    92KB

    MD5

    ed04ed8dadb0743d75056e2ea55184ee

    SHA1

    9e1ad3c857f22453197fd9daec6c03592cdb9d8e

    SHA256

    acf4cfa275cc7edec34ae2e85ee47d6df85ffbdd9f7da1aecc30064235fd6d00

    SHA512

    45441346d64630dab07d46cc0b836071647f34462f78cbaa7defe40af631d1f3abf0d9bbb7d6799f27de3beae06b9a2d08464035900a78f2a70c5552023bdee2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\msvcr71.dll

    Filesize

    340KB

    MD5

    86f1895ae8c5e8b17d99ece768a70732

    SHA1

    d5502a1d00787d68f548ddeebbde1eca5e2b38ca

    SHA256

    8094af5ee310714caebccaeee7769ffb08048503ba478b879edfef5f1a24fefe

    SHA512

    3b7ce2b67056b6e005472b73447d2226677a8cadae70428873f7efa5ed11a3b3dbf6b1a42c5b05b1f2b1d8e06ff50dfc6532f043af8452ed87687eefbf1791da

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pi.inf

    Filesize

    5KB

    MD5

    50cd60b8d92cc119d29fd3402379c54f

    SHA1

    fcef127b6710192322d81fec135266ae1510cf48

    SHA256

    5083d6c30a3f6310585044f8508de439d984935887edabd315c5976b03015e99

    SHA512

    c14113ebad396bd8771970cbd635367919dbc358b8be0cbfb1df66e4c620fae3ce7f866e0c4c719b441ee0e446868e19347281e8cbf7f02b6e118a901b9e815d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pibase.dll

    Filesize

    44KB

    MD5

    98bd7d3d8acc06b4c0c7390889ef0656

    SHA1

    d02b2657185307698b67cfb22eb8c1bb28856964

    SHA256

    8e8cb8ac1f26a3dd31ef22aeb50f89336944be16be61b0fd01b6b04438dc8ede

    SHA512

    d2c618007783b3c4c30b692ae4e17c32c6098f2b83d7912f97e8c92f21be9ffd8802f74b3caf4fdc9aac606f0c42f860ef9c2dee766d8ccbb91a551944c1c2b7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pidav.dll

    Filesize

    80KB

    MD5

    96e0dcb4a51891c41cca6219fa5cbe0a

    SHA1

    7dad4c1d71ae6435e9a4a4ad574e68fd150b07f0

    SHA256

    e218e7b8508a4b2b7e0900afd9e11813863982e235343410aa6d0e8f570acdbc

    SHA512

    37185949f2f6ec437fee1ab73ddbb86a5073c753cdfd7b0ddd1b98eab33573f800588cbc18ae9519a1ba8dd479a44694b31010aa47ea91d9277b4023d73ced67

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\piorg.dll

    Filesize

    422KB

    MD5

    d433efe19fd0d9b896945f34ba839698

    SHA1

    ade6c8c2732fd18308b512986a485dff40a70774

    SHA256

    81b9f877f9198a761f820a0ea2b02eb3db85750011e50997560391dc2f160c64

    SHA512

    97d2d2ceba05339a830ee5ad2a1dd9667dbf7dc17b5bf4509eb72c8c6a45214756539bab2a4e7d6a663ba67a9de73878e82e7582240e3a5f76bdb1ab8bc0324f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\piorgres.dll

    Filesize

    239KB

    MD5

    b294757974b9d75185ed39b1b6a2fd89

    SHA1

    8abb26a5bfaeb1765aa114d8f2cc3b4b01ed4e57

    SHA256

    80b63a6d100879f040ccc4e409bca0698a176cbd2cfa843087b0d3668c18451e

    SHA512

    6b2654222bc7b25784b17ef9b3d7667add7525e5d5b0fabfed7eaf2317466db2eaaea11a32580b9aac2d268e3a1c5b2e6b6afc1a8b8a760c44902a94a0b29dec

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pisync.dll

    Filesize

    192KB

    MD5

    7a53619ab1d41dba3a1093dce1358428

    SHA1

    4ab318c3b9e337ecf065ceda96b10041c0febc1c

    SHA256

    b024947095d3af84f47a45a35bf2647bb8a0f871c2742266b369f0ac5f735ec1

    SHA512

    d34c632fcf9819fd14dbef16ee70fa2adc6cf99ed540c4e3939107c6db5b94d1cf396f4f50473fb901ee1062ac98b86e82a8e50326ee6ea3c3a8597d0c0001f8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pisynctw.exe

    Filesize

    52KB

    MD5

    5c6080d433f02d8f173ec738af8b451f

    SHA1

    137bb1172b6faeeaafb7b09026182a4fc0e030ad

    SHA256

    bb4a4cd4f0808bfe62b4c3024d099a78dc322ee579756a35fcbe3f8160dbbc0f

    SHA512

    8b091d09b19df1f9ebcc97a39b4c9e2dab840ecd7448aea53c33d3809185b07be8b58c7c56e058596d591348529cb8b29508f6769b30568d149a64ec0ec22c0e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\piview.dll

    Filesize

    304KB

    MD5

    4e47d1d28edd06317f7f831e2f8075f2

    SHA1

    831ac6c58973e0aa5db943194e89424603be0e78

    SHA256

    b1b03e634c085aab68e3f2c78fdcdcc745e8341c0dff6c494e88911b81a61dbc

    SHA512

    9baa53338e159ae1ada33b0cf2ad07e039a18604e957d022d66fa4b5bf192eb2b4be9dd0120f4a6edc012f211ff831cc2d59c2fb3a40c8580874ff6ce0c57e6a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\prgemp.gif

    Filesize

    84B

    MD5

    9986d91856ced30b8e9449274754821e

    SHA1

    6f54311a5de6b2da60172e885e606330481ff5f4

    SHA256

    f35aee0df2db9e5a9574d250f89be23a69c088b346a7612c34494284d6077df1

    SHA512

    80d942d30d73a74f8b94e8229229e6154b0abab4c69c561f26c19795ab4d56b31cdbec626a4640ed78c9bedd6db7409029822229a16a13a4755ebfb7430724b9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\prggrn.gif

    Filesize

    83B

    MD5

    eaa956be72f66d9d2169adc197073390

    SHA1

    b3fb217bab4419afb26f2899ced7aa33cab41e67

    SHA256

    11f68508bcd118f13a1a31bf783706850be5e80364d21a73a896449324b8eed4

    SHA512

    2f26c4584fca65dc8c87e311af6ed539de0b5f322fcb79fb5c03a7c529fd5c110dbdafc05d7ce686d39ff283514e7446b3d44f7df42af4fa6c03915839853fac

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\slides~1.js

    Filesize

    162KB

    MD5

    cf9dda1c54df6502cf15b68220fbaab6

    SHA1

    3b49ca279ae8d2b02c0ec898562212001c34d715

    SHA256

    5deb9766faf4d8be4d4d9e56360e5bdc985da19ad8e2d94e1a80a59eaecad916

    SHA512

    e7a6c45b8a11723b2f03d3ffd8cfc964382039c6d657fa4b7d7fbd05c42255c7aa2b83d4ac2312cbdf0b2457833e4a70864e23c788df501d45e6dccd5b8a65e2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\slides~1.xml

    Filesize

    8KB

    MD5

    7b53d1103c0a17a32b60e7925f8c529e

    SHA1

    5b104e29fd8b9570459a2cd35b0ab35c9255bd13

    SHA256

    799c3b251c5856dae775c9f9fbb47c9ec33a601fcfe2e1bbd63b7f976e53c3b0

    SHA512

    3636c2844bca0eec6369683d3af49a1eaad9dfb2115941e2942980079f1af0e1acb4aa6fd00259a4cb6647805e91c3d18a731ca522d0be2157ce5d7a13d04e78

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\splash.gif

    Filesize

    2KB

    MD5

    28e38509e9aced026d1a5dbc8f1dc767

    SHA1

    73b5cbee7ebfc693484a20cdc472efb0e3aaebb8

    SHA256

    696ca709ae25835fffa1dddabb725e93f1c5de461c659ecf0a7878b704358c12

    SHA512

    95ed6f422e21e9301c206758b02a60a81fd7b09f13b1c2293e5405878e25e04ddde46902d82dd69bd496a6396884e738a4d0eea25bb57bdf55bd949c4f85d20e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\startup.js

    Filesize

    19KB

    MD5

    82dac91011c75b5e433e29ab43780c8c

    SHA1

    23438c2e48ea5324cf3a9727320474540e5cdd45

    SHA256

    1cc5e3ce8704492f87932983847c8c5a2be2aac1a4744b9fc5d0749efcd27321

    SHA512

    bb0d1e0d50dc0eaca926ad1246ee0c54e587468ffc65adfcf8e9df2881661394ae8c8eb32d9b60c8e70c45350d111489f6aa1ce61fb420c087545c1dfd4dc85d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unicows.dll

    Filesize

    239KB

    MD5

    e1102cedf0c818984c2aca2a666d4c5f

    SHA1

    d8d88ea7083aee9c40f6fdc6c56451a018d21a83

    SHA256

    22f23cc65698741184ec34f46e6f69717644e0b5aabf5d5bd015101f2d72e56e

    SHA512

    e58b35815801d6d3797f95c986834d2ca5450ccc3f1fa1d27d127a8d1d36f8e21279173715a00686c9c831d22d7c5b5b9cc5874170223a4d78f09c4eefa390a2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\viewer.htm

    Filesize

    1KB

    MD5

    79c164f8143e4a53e87a758e82afe3e0

    SHA1

    9bb5f1f62b2ba8edaef186cba37366d637241c9a

    SHA256

    e22c640fb743ed4f898aee780cd7f51380486ccbd798593e999e5b5dc6442551

    SHA512

    d8f49cf262cda54efd815029f78ac0e79db45c67295ed1f30add36a36f6ca3913f983881ac478063e2d94f1ca3e672d6521aae093b439ab873de221cce68f7b0

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ADVPACK.DLL

    Filesize

    90KB

    MD5

    0ac28de5e930e8a52ad6b163c5473412

    SHA1

    25371c9d876959cb58b50c25ad709cf98dde45bb

    SHA256

    06eed244d89f6e15205d5beb8085ac33c0de486dfe30eec9fb73b91de07e5f62

    SHA512

    c2c82449927cac953668142a3f597c06626b0b3a26e8036de34e4ca1042a572fa3befa799d43fb24a1d23c821b5ed7994e3d211b6aaced15ba31d4639e96d877

  • memory/2688-0-0x0000000001000000-0x0000000001156000-memory.dmp

    Filesize

    1.3MB

  • memory/2688-1-0x0000000000B00000-0x0000000000C56000-memory.dmp

    Filesize

    1.3MB

  • memory/2688-336-0x0000000001000000-0x0000000001156000-memory.dmp

    Filesize

    1.3MB