Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    27-01-2025 19:25

General

  • Target

    JaffaCakes118_42eda4db1284727e0cc4ddcc1c575cc7.exe

  • Size

    235KB

  • MD5

    42eda4db1284727e0cc4ddcc1c575cc7

  • SHA1

    5f9e34aebac1aefa99230ab6697ed20c65f18d30

  • SHA256

    17e16a91b5b16bd34fde1dbb4ac47af55b0d76db77593c2467c75d90f9e845be

  • SHA512

    ad9da93e9a6d3947aeaaf1906f1ef37496bd651a90f6f720d5a21d9d9e0106e1631ffcc422b33e4ec3263903a6cb5a08909681336caee35f9a7586115d4fac60

  • SSDEEP

    6144:3A8CaRVMMMMMM2MMMMMhP+Nnb/dUrAeb41Lq+s:3AbaRaMMMMM2MMMMMhP+Nnb/dU0nLq+

Malware Config

Signatures

  • Expiro family
  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Drops Chrome extension 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 21 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 20 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_42eda4db1284727e0cc4ddcc1c575cc7.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_42eda4db1284727e0cc4ddcc1c575cc7.exe"
    1⤵
    • Drops Chrome extension
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:2112
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2952
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2880
  • C:\Windows\system32\dllhost.exe
    C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
    1⤵
    • Drops file in Windows directory
    PID:2652
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.vir

    Filesize

    316KB

    MD5

    2ec1b243d4aadbc246d9158d8b0bedca

    SHA1

    fd6eb0bec228885dd90043f0056b3fbcca63518b

    SHA256

    c3ceecd23d2a97bfab943fc4c247265ffb07eaf6dd6ede8d1bbcb5e0fd23667c

    SHA512

    91be3d9e0156ff5e505a8a2d18b91ef0be24209a3b4d12cf940d0c26155bb4474fdb9bde5b7bef0f12a2bed6c3110e82f85e6e5ce84a2075f4606b1f94e77e5a

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    235KB

    MD5

    f50e4d5eedcff6bf9ae05b258f2fa14b

    SHA1

    753d2083454cf357aca4a9225dff79903efddeea

    SHA256

    b7860df6102ffc8aec883f4e5f361f2a9c06cce3bf562181e552bcb1ef6d2a15

    SHA512

    a9488d1824016e20eddddd23501e505bef57fc225be6ec8a87e6d9225c150ef91e5396e50f3f48bbd0a399280aca28603367e745c426ef8885801c0eff5ad5e6

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

    Filesize

    1003KB

    MD5

    1af94dba7d6c029b758ea3dbe5a2924f

    SHA1

    1d8ad84a31997cc7999fa45aeb822d72004874e7

    SHA256

    3309a4e30b7a1fdd7dd60302654b7d12339911119c9b94af9745f09f3eeb0cb2

    SHA512

    ce462354aa1cff15e45be8a1c14428c55910290a1f62047437a4e68599e4dc415a69d52660073176fcd0d8f82680c22f1614dd47ba63613d5a51da1ec7496864

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    266KB

    MD5

    3fd406255e340fe47973845922d7e226

    SHA1

    60a67595877f06174f951aec6249a4c606435843

    SHA256

    b0872659ef87817ac9d2afd1eeb6291dd5a359dd7881a17c05f518c65a4d7753

    SHA512

    22cb121196787f57e2ace43b368065a73db4a68f4c96f955bb15c6510503812354dfe95205750ea6a341e45dcefc93b0d14c12ef65363e8ebf9e26b09afd6026

  • memory/2112-2-0x0000000001000000-0x0000000001088000-memory.dmp

    Filesize

    544KB

  • memory/2112-0-0x0000000001000000-0x0000000001088000-memory.dmp

    Filesize

    544KB

  • memory/2112-1-0x0000000001002000-0x0000000001003000-memory.dmp

    Filesize

    4KB

  • memory/2880-26-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/2880-27-0x0000000000402000-0x0000000000403000-memory.dmp

    Filesize

    4KB

  • memory/2880-69-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/2952-13-0x0000000010000000-0x0000000010087000-memory.dmp

    Filesize

    540KB

  • memory/2952-14-0x000000001000C000-0x000000001000D000-memory.dmp

    Filesize

    4KB

  • memory/2952-32-0x0000000010000000-0x0000000010087000-memory.dmp

    Filesize

    540KB