Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-02-2025 04:32

General

  • Target

    JaffaCakes118_b301edcdd3eb036386a7a50de1955e9d.exe

  • Size

    386KB

  • MD5

    b301edcdd3eb036386a7a50de1955e9d

  • SHA1

    02ae88eb979136d854f3c8302a67425a6a67948a

  • SHA256

    40c7a2750beb5e3d1a6902909b9eca2182a3a177693fc9df0895914357f37ed5

  • SHA512

    84402a5e424943cf61f99b0fcf6c587b8e67b737a8bcc834095a65d160cc5cef6f857484008d8e13c2de56bed2f041483ed2df01ffc65a81869dff1cfd7d3f22

  • SSDEEP

    12288:YvuloS7zEAoHLiPcS7N0taa+aT2L8tlIsTT:y4oS7oAoHL8cS7OtaiTtIsTT

Malware Config

Signatures

  • Expiro family
  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Drops Chrome extension 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 21 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 20 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b301edcdd3eb036386a7a50de1955e9d.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b301edcdd3eb036386a7a50de1955e9d.exe"
    1⤵
    • Drops Chrome extension
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2596
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:1540
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2724
  • C:\Windows\system32\dllhost.exe
    C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
    1⤵
    • Drops file in Windows directory
    PID:2804
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.vir

    Filesize

    316KB

    MD5

    2ec1b243d4aadbc246d9158d8b0bedca

    SHA1

    fd6eb0bec228885dd90043f0056b3fbcca63518b

    SHA256

    c3ceecd23d2a97bfab943fc4c247265ffb07eaf6dd6ede8d1bbcb5e0fd23667c

    SHA512

    91be3d9e0156ff5e505a8a2d18b91ef0be24209a3b4d12cf940d0c26155bb4474fdb9bde5b7bef0f12a2bed6c3110e82f85e6e5ce84a2075f4606b1f94e77e5a

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    235KB

    MD5

    7c3ec859c111c059a8a4a214489e9117

    SHA1

    9bcc6035b61e3856a7760fd23a8324cfe5489781

    SHA256

    5c7700ee21fb4eeb0f6f1668819aa85c44bf975dfe9035868905302070849e25

    SHA512

    06a339a8412c7f0a4668055abb63e74b4606d95c250547552aadf3879171d9ec602e9dc39c96ac5af4948a64fd4ded74f4a97679ddede1634af67342de388741

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

    Filesize

    1003KB

    MD5

    660c8b8e8084ee4dc5dd10095ea94fd1

    SHA1

    052f64ab6f8087037354d113d973c1a42c935ba7

    SHA256

    1244f8f5d973e3c85ed82dd11cc6460c4deaab37af4fe1e8b36db59e9c2408a4

    SHA512

    4f85d939bfcc7f3641cb058dfbd557c89b1046ddeab335400b4273160a3396a319ce55b77718412f8b66a8da2e63e474b43a4808f4203d4efe65fd04221ef4f9

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    266KB

    MD5

    f2f3b48a8e2931afeca7c2a6166be621

    SHA1

    db252d23df59e5cc0e568b2ee17611030cb6e9eb

    SHA256

    91ddaa6561ce33dde4b3faebfc0deb0bf930566791bc1f847d193841c8188a39

    SHA512

    ee1d8b5e990791089c18f18f2e55b04b1e498998316bec1a55dee6da12e75cb630af38553ee4eb77b60343ca1b6d83c8a47831a84983eb8149af013928d620e8

  • memory/1540-13-0x0000000010000000-0x0000000010087000-memory.dmp

    Filesize

    540KB

  • memory/1540-14-0x000000001000C000-0x000000001000D000-memory.dmp

    Filesize

    4KB

  • memory/1540-32-0x0000000010000000-0x0000000010087000-memory.dmp

    Filesize

    540KB

  • memory/2596-2-0x0000000001000000-0x00000000010AC000-memory.dmp

    Filesize

    688KB

  • memory/2596-0-0x0000000001000000-0x00000000010AC000-memory.dmp

    Filesize

    688KB

  • memory/2596-1-0x000000000101A000-0x000000000101B000-memory.dmp

    Filesize

    4KB

  • memory/2724-26-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/2724-27-0x0000000000402000-0x0000000000403000-memory.dmp

    Filesize

    4KB

  • memory/2724-69-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB