General

  • Target

    JaffaCakes118_f8aa0f8b8dc1527724ba768a89e98798

  • Size

    220KB

  • Sample

    250214-rdywgsymcp

  • MD5

    f8aa0f8b8dc1527724ba768a89e98798

  • SHA1

    5eb2eb5cc9cb90108b69991c604eb5c4836d549f

  • SHA256

    3eeb1fe9f42d01fa2162121c8a37f1360af818be5e41cb0a52e7fbe5877b484c

  • SHA512

    ac3b0513a2ba9887f7d99c19ba0804ec4c546a8a0424042d648abf24a113c0b4f51bd91955952b77127d95f5063e7bc664e1991199bf830f704a70d5bf25a4ed

  • SSDEEP

    3072:b3S8Iy/aNagTeo6isinQ6ZmQGU0yS+y2Q18mn6FEG57:VRri1z0ySL2Q18A6Ft5

Malware Config

Targets

    • Target

      JaffaCakes118_f8aa0f8b8dc1527724ba768a89e98798

    • Size

      220KB

    • MD5

      f8aa0f8b8dc1527724ba768a89e98798

    • SHA1

      5eb2eb5cc9cb90108b69991c604eb5c4836d549f

    • SHA256

      3eeb1fe9f42d01fa2162121c8a37f1360af818be5e41cb0a52e7fbe5877b484c

    • SHA512

      ac3b0513a2ba9887f7d99c19ba0804ec4c546a8a0424042d648abf24a113c0b4f51bd91955952b77127d95f5063e7bc664e1991199bf830f704a70d5bf25a4ed

    • SSDEEP

      3072:b3S8Iy/aNagTeo6isinQ6ZmQGU0yS+y2Q18mn6FEG57:VRri1z0ySL2Q18A6Ft5

    • Expiro family

    • Expiro, m0yv

      Expiro aka m0yv is a multi-functional backdoor written in C++.

    • Expiro payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Modifies WinLogon

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks