Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-02-2025 03:59

General

  • Target

    JaffaCakes118_1e5821d7224e4b03e70ab75a6fed47b2.exe

  • Size

    181KB

  • MD5

    1e5821d7224e4b03e70ab75a6fed47b2

  • SHA1

    05e5b92c570f74c33c3d5946de42bc4bf217a616

  • SHA256

    155ba2df7e1adf083b03fa72dab3bb9dba7c952524d34f5b5f118eab66b676f4

  • SHA512

    cd3db5d76697ec11d59970fc5a69b37c830aed597ee8556316453ff13cf351655701a7eabd43b840fbb6004aca46ed5d69b886dba79e9ed1380804ad7243f745

  • SSDEEP

    3072:8/8kE0zRKjl1PewbrnBt/rCVHOg9nEx8RW/4CScR45J36nXcLULAG67aXq:4+0VKp1PeSrP/uVTntvq45J36nXcQm

Malware Config

Signatures

  • Expiro family
  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e5821d7224e4b03e70ab75a6fed47b2.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1e5821d7224e4b03e70ab75a6fed47b2.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1544-0-0x0000000001000000-0x000000000107A000-memory.dmp

    Filesize

    488KB

  • memory/1544-1-0x0000000001001000-0x0000000001002000-memory.dmp

    Filesize

    4KB

  • memory/1544-2-0x0000000001000000-0x000000000107A000-memory.dmp

    Filesize

    488KB