Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-02-2025 19:46

General

  • Target

    JaffaCakes118_a31534c0f0f3d750f9f7bc41074ced27.exe

  • Size

    235KB

  • MD5

    a31534c0f0f3d750f9f7bc41074ced27

  • SHA1

    582121ea0269a472265eab53523b6a9ad2d0653d

  • SHA256

    6e25067589d374d2a3a5082e98f38092ddf16181edb0c9b8560510d812f2ac45

  • SHA512

    34eec999a908268ac761e023ebba63f0d64a9dd2cb7efff73e06ba3f33c057ab72792c651a8759a2da4e3ea19cc1400bfd1523214a9038e23b2de7608a5bb48a

  • SSDEEP

    6144:3O8CaRVMMMMMM2MMMMMcBPxlpo9NC/3RElH8HhkRIkAiN7R+Di:3ObaRaMMMMM2MMMMMc/lpMCJ2GkRIkR

Malware Config

Signatures

  • Expiro family
  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Drops Chrome extension 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a31534c0f0f3d750f9f7bc41074ced27.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a31534c0f0f3d750f9f7bc41074ced27.exe"
    1⤵
    • Drops Chrome extension
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:5004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

    Filesize

    599KB

    MD5

    1fd5544183ad6a6a66f673fab48b9f89

    SHA1

    99d4d1b452bdcb85a439799718fd829bcefa054e

    SHA256

    2ca02f5d99852c9f2589d9a7b1d7865479803fe1ae24bfff622a7aba75552a21

    SHA512

    ec2eb621f7db60ef8b4c877f93b031e69fa2f1381dfb9f0ee3e6c022144d32cd8323d3b72b92b43d2d5952882e08a087fa1add78a5706a90f20024638706cb51

  • C:\Windows\SysWOW64\msiexec.vir

    Filesize

    234KB

    MD5

    f25fe349eca87d50de8c2d508345c3a4

    SHA1

    59e7df54d58c9af6b07374302d06afc3ca7e43ac

    SHA256

    949cbd0b628fbc76fcd5a04e01d412b1dc55130719576d8db67d092f35126896

    SHA512

    c92466ed6daa1f0c89e0455862b66dceca6fbe38c7529d14f635bb3d99a8ceb04529a74065fe1763d53825a6904ec65ed84304ef9891b47ff9a551fbad247fcb

  • memory/5004-0-0x0000000001000000-0x0000000001088000-memory.dmp

    Filesize

    544KB

  • memory/5004-1-0x0000000001002000-0x0000000001003000-memory.dmp

    Filesize

    4KB

  • memory/5004-2-0x0000000001000000-0x0000000001088000-memory.dmp

    Filesize

    544KB