Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25/01/2025, 10:29 UTC

General

  • Target

    JaffaCakes118_2abba488f7a377533826cf4455597622.exe

  • Size

    392KB

  • MD5

    2abba488f7a377533826cf4455597622

  • SHA1

    a23bad391d614a5d8e0d39278afc1b2764d0f285

  • SHA256

    18d194c643fd462d8cbdf533020bc7f94a04452fd290c81cf1ae73f9b0177f47

  • SHA512

    5b14015bb44999bd4e51503bead7077badeeeec9c9eb7b38b30eee2fc5cfba3d6deecd291b8b4d230b3e9148d0a47aa01465e3338ab526dfefc189cf2d306d5e

  • SSDEEP

    12288:XLlB+ihkpHmqBZN0wL3InaHbw3AAwyg8HX7Al:X+ihylDHGvg832

Malware Config

Signatures

  • Expiro family
  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2abba488f7a377533826cf4455597622.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2abba488f7a377533826cf4455597622.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2776-0-0x0000000001000000-0x00000000010B2000-memory.dmp

    Filesize

    712KB

  • memory/2776-1-0x0000000001014000-0x0000000001015000-memory.dmp

    Filesize

    4KB

  • memory/2776-3-0x0000000000200000-0x000000000020A000-memory.dmp

    Filesize

    40KB

  • memory/2776-2-0x0000000000200000-0x000000000020A000-memory.dmp

    Filesize

    40KB

  • memory/2776-5-0x0000000000200000-0x0000000000206000-memory.dmp

    Filesize

    24KB

  • memory/2776-4-0x0000000001000000-0x00000000010B2000-memory.dmp

    Filesize

    712KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.