Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2025 18:25
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ae2a6ff3181f19d491db712c80200ad7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ae2a6ff3181f19d491db712c80200ad7.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_ae2a6ff3181f19d491db712c80200ad7.exe
-
Size
124KB
-
MD5
ae2a6ff3181f19d491db712c80200ad7
-
SHA1
7f462f4c9175bdd2f2eb69f774ba918d1833befc
-
SHA256
45adb3afd017026adc61e4b72f24c3978d875c96798d7a771d6c203f7bd1db53
-
SHA512
f45689df4f5c1c757f050b83e920831522e5ed2858e2e4e785642cf56c54f418171d35e5d7feb0b966f0955c7b97ecbca74d30afdbe4b92f5de4ab08e04c00f0
-
SSDEEP
768:RE30e/7tEaWcArSwaydTb0EroSd3QXGsBS4sZFFSUv6GfEK+RsWW2qTN4lvCy2Zv:u+PeXonnUStQXDI4spvVp+N8NECtH3
Malware Config
Signatures
-
Expiro family
-
Expiro payload 9 IoCs
resource yara_rule behavioral2/memory/528-5-0x0000000000400000-0x000000000040B000-memory.dmp family_expiro2 behavioral2/memory/528-9-0x0000000000400000-0x000000000040B000-memory.dmp family_expiro2 behavioral2/memory/820-19-0x0000000000400000-0x000000000040B000-memory.dmp family_expiro2 behavioral2/memory/820-20-0x0000000000400000-0x000000000040B000-memory.dmp family_expiro2 behavioral2/memory/820-22-0x0000000000400000-0x000000000040B000-memory.dmp family_expiro2 behavioral2/memory/820-25-0x0000000000400000-0x000000000040B000-memory.dmp family_expiro2 behavioral2/memory/820-26-0x0000000000400000-0x000000000040B000-memory.dmp family_expiro2 behavioral2/memory/820-30-0x0000000000400000-0x000000000040B000-memory.dmp family_expiro2 behavioral2/memory/820-35-0x0000000000400000-0x000000000040B000-memory.dmp family_expiro2 -
Executes dropped EXE 2 IoCs
pid Process 1472 service117.exe 820 service117.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe Reader Speed Launcher = "C:\\Windows\\SysWOW64\\service117.exe" service117.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe Reader Speed Launcher = "C:\\Windows\\SysWOW64\\service117.exe" service117.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: service117.exe File opened (read-only) \??\F: service117.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Adobe Reader Speed Launcher = "C:\\Windows\\SysWOW64\\service117.exe" service117.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\service117.exe JaffaCakes118_ae2a6ff3181f19d491db712c80200ad7.exe File created C:\Windows\SysWOW64\service117.exe JaffaCakes118_ae2a6ff3181f19d491db712c80200ad7.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1736 set thread context of 528 1736 JaffaCakes118_ae2a6ff3181f19d491db712c80200ad7.exe 82 PID 1472 set thread context of 820 1472 service117.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ae2a6ff3181f19d491db712c80200ad7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_ae2a6ff3181f19d491db712c80200ad7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service117.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service117.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1736 wrote to memory of 528 1736 JaffaCakes118_ae2a6ff3181f19d491db712c80200ad7.exe 82 PID 1736 wrote to memory of 528 1736 JaffaCakes118_ae2a6ff3181f19d491db712c80200ad7.exe 82 PID 1736 wrote to memory of 528 1736 JaffaCakes118_ae2a6ff3181f19d491db712c80200ad7.exe 82 PID 1736 wrote to memory of 528 1736 JaffaCakes118_ae2a6ff3181f19d491db712c80200ad7.exe 82 PID 1736 wrote to memory of 528 1736 JaffaCakes118_ae2a6ff3181f19d491db712c80200ad7.exe 82 PID 1736 wrote to memory of 528 1736 JaffaCakes118_ae2a6ff3181f19d491db712c80200ad7.exe 82 PID 1736 wrote to memory of 528 1736 JaffaCakes118_ae2a6ff3181f19d491db712c80200ad7.exe 82 PID 528 wrote to memory of 1472 528 JaffaCakes118_ae2a6ff3181f19d491db712c80200ad7.exe 83 PID 528 wrote to memory of 1472 528 JaffaCakes118_ae2a6ff3181f19d491db712c80200ad7.exe 83 PID 528 wrote to memory of 1472 528 JaffaCakes118_ae2a6ff3181f19d491db712c80200ad7.exe 83 PID 1472 wrote to memory of 820 1472 service117.exe 84 PID 1472 wrote to memory of 820 1472 service117.exe 84 PID 1472 wrote to memory of 820 1472 service117.exe 84 PID 1472 wrote to memory of 820 1472 service117.exe 84 PID 1472 wrote to memory of 820 1472 service117.exe 84 PID 1472 wrote to memory of 820 1472 service117.exe 84 PID 1472 wrote to memory of 820 1472 service117.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ae2a6ff3181f19d491db712c80200ad7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ae2a6ff3181f19d491db712c80200ad7.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ae2a6ff3181f19d491db712c80200ad7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ae2a6ff3181f19d491db712c80200ad7.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\service117.exe-n3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\service117.exe-n4⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- System Location Discovery: System Language Discovery
PID:820
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5ae2a6ff3181f19d491db712c80200ad7
SHA17f462f4c9175bdd2f2eb69f774ba918d1833befc
SHA25645adb3afd017026adc61e4b72f24c3978d875c96798d7a771d6c203f7bd1db53
SHA512f45689df4f5c1c757f050b83e920831522e5ed2858e2e4e785642cf56c54f418171d35e5d7feb0b966f0955c7b97ecbca74d30afdbe4b92f5de4ab08e04c00f0