Analysis

  • max time kernel
    94s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-02-2025 04:12

General

  • Target

    JaffaCakes118_035d7db89f69b0d3cb2d93bafc334210.exe

  • Size

    219KB

  • MD5

    035d7db89f69b0d3cb2d93bafc334210

  • SHA1

    dd7e1910f97da1b9ddc1a3fdb027d5d44b4b2a52

  • SHA256

    fa3ac3e12fb58a8d22bbceda4fe89ad83c561f1cdb607d6950ecbccf2b8f9396

  • SHA512

    610300ca90ce5a7416540d153e749051971d65faee6794eb1f60d39b2fe284083723b190ec5dfe38693ea234651f8dbb2206b70529858704c4796a1b236cdfc4

  • SSDEEP

    6144:32+/ny/HPzP+lzNe4V0Vv3GEC/vtcJEKxJS:3pnGHraQ4kq8BxJ

Malware Config

Signatures

  • Expiro family
  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_035d7db89f69b0d3cb2d93bafc334210.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_035d7db89f69b0d3cb2d93bafc334210.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2280
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 440
      2⤵
      • Program crash
      PID:516
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2280 -ip 2280
    1⤵
      PID:4540

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2280-0-0x0000000030000000-0x0000000030168000-memory.dmp

      Filesize

      1.4MB

    • memory/2280-1-0x0000000030000000-0x0000000030168000-memory.dmp

      Filesize

      1.4MB