Analysis

  • max time kernel
    150s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-01-2025 19:25

General

  • Target

    JaffaCakes118_42eda4db1284727e0cc4ddcc1c575cc7.exe

  • Size

    235KB

  • MD5

    42eda4db1284727e0cc4ddcc1c575cc7

  • SHA1

    5f9e34aebac1aefa99230ab6697ed20c65f18d30

  • SHA256

    17e16a91b5b16bd34fde1dbb4ac47af55b0d76db77593c2467c75d90f9e845be

  • SHA512

    ad9da93e9a6d3947aeaaf1906f1ef37496bd651a90f6f720d5a21d9d9e0106e1631ffcc422b33e4ec3263903a6cb5a08909681336caee35f9a7586115d4fac60

  • SSDEEP

    6144:3A8CaRVMMMMMM2MMMMMhP+Nnb/dUrAeb41Lq+s:3AbaRaMMMMM2MMMMMhP+Nnb/dU0nLq+

Malware Config

Signatures

  • Expiro family
  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Drops Chrome extension 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_42eda4db1284727e0cc4ddcc1c575cc7.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_42eda4db1284727e0cc4ddcc1c575cc7.exe"
    1⤵
    • Drops Chrome extension
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:3676
  • C:\Windows\servicing\TrustedInstaller.exe
    C:\Windows\servicing\TrustedInstaller.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:3100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

    Filesize

    599KB

    MD5

    4cbd5f424bbaa4f43ab298ea4375d0dd

    SHA1

    f4c0f56b8fb399ecea8611078960132e595a64ee

    SHA256

    e11a6fffdb7fc2ed198fac5aa49924fd28e6dda79778b838fbd32925dfb792a3

    SHA512

    f29ddb363ea71418a005271671a1f327d73a4b83a2a19c21cbbb2392b2a0ea03fedbbd06547ff7b3af0cac54e7805590f971153c48513aed5d1762c972452151

  • C:\Windows\SysWOW64\msiexec.vir

    Filesize

    234KB

    MD5

    e6c284918e4690039eedbb73234588e0

    SHA1

    9126108b057aa9dac12ea68ba29f7a30464b5ef8

    SHA256

    a834b20509cb009ea8738b2e95ac50bcd1971c185b99c4a245ff15c4c8163a55

    SHA512

    c5fae3894138510a2202af8528b67d5f343a90b6850a4296128b245935f5dfbb65aafd048ec6631c2cca7415821ac57bd52140057b153bffe3d96fc952bceb59

  • C:\Windows\servicing\TrustedInstaller.exe

    Filesize

    193KB

    MD5

    805418acd5280e97074bdadca4d95195

    SHA1

    a69e4f03d775a7a0cc5ed2d5569cbfbb4d31d2d6

    SHA256

    73684e31ad4afe3fdc525b51ccaacc14d402c92db9c42e3fcbfe1e65524b1c01

    SHA512

    630a255950c0ae0983ae907d20326adea36ce262c7784428a0811b04726849c929bc9cea338a89e77447a6cec30b0889694158327c002566d3cf5be2bb88e4de

  • memory/3676-0-0x0000000001000000-0x0000000001088000-memory.dmp

    Filesize

    544KB

  • memory/3676-1-0x0000000001002000-0x0000000001003000-memory.dmp

    Filesize

    4KB

  • memory/3676-2-0x0000000001000000-0x0000000001088000-memory.dmp

    Filesize

    544KB