Analysis
-
max time kernel
144s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b7f370b70ab5371c554c8bca0783ba7c.exe
Resource
win10v2004-20250313-en
General
-
Target
JaffaCakes118_b7f370b70ab5371c554c8bca0783ba7c.exe
-
Size
60KB
-
MD5
b7f370b70ab5371c554c8bca0783ba7c
-
SHA1
94a031951b19b7e5a8459dec49da99877e33c744
-
SHA256
596397cadce5ecdb769d02c7df256867b0e51becc34469df0cc70572f34716bf
-
SHA512
1e3504c3b41aafeba0dcea470a8cb93ec3685813b953f0468828db94f6aabfa4fa967e0cb849fe7e5a855145e5af32fddc6d9921e3ee158de0096737ff74b935
-
SSDEEP
768:FE30e/7tEaWcArSwaydTb0EroSd3QXGsBS4sZFFSUv6GfEK+RsWW2qTN4lvCy2ZL:S+PeXonnUStQXDI4spvVp+N8NECtH3T
Malware Config
Signatures
-
Expiro family
-
Expiro payload 8 IoCs
resource yara_rule behavioral1/memory/2208-5-0x0000000000400000-0x000000000040B000-memory.dmp family_expiro2 behavioral1/memory/2208-9-0x0000000000400000-0x000000000040B000-memory.dmp family_expiro2 behavioral1/memory/4756-20-0x0000000000400000-0x000000000040B000-memory.dmp family_expiro2 behavioral1/memory/4756-21-0x0000000000400000-0x000000000040B000-memory.dmp family_expiro2 behavioral1/memory/4756-23-0x0000000000400000-0x000000000040B000-memory.dmp family_expiro2 behavioral1/memory/4756-27-0x0000000000400000-0x000000000040B000-memory.dmp family_expiro2 behavioral1/memory/4756-28-0x0000000000400000-0x000000000040B000-memory.dmp family_expiro2 behavioral1/memory/4756-35-0x0000000000400000-0x000000000040B000-memory.dmp family_expiro2 -
Executes dropped EXE 2 IoCs
pid Process 1584 service227.exe 4756 service227.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1279544337-3716153908-718418795-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe Reader Speed Launcher = "C:\\Windows\\SysWOW64\\service227.exe" service227.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Adobe Reader Speed Launcher = "C:\\Windows\\SysWOW64\\service227.exe" service227.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: service227.exe File opened (read-only) \??\F: service227.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Adobe Reader Speed Launcher = "C:\\Windows\\SysWOW64\\service227.exe" service227.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\service227.exe JaffaCakes118_b7f370b70ab5371c554c8bca0783ba7c.exe File created C:\Windows\SysWOW64\service227.exe JaffaCakes118_b7f370b70ab5371c554c8bca0783ba7c.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5980 set thread context of 2208 5980 JaffaCakes118_b7f370b70ab5371c554c8bca0783ba7c.exe 87 PID 1584 set thread context of 4756 1584 service227.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b7f370b70ab5371c554c8bca0783ba7c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service227.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service227.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b7f370b70ab5371c554c8bca0783ba7c.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 5980 wrote to memory of 2208 5980 JaffaCakes118_b7f370b70ab5371c554c8bca0783ba7c.exe 87 PID 5980 wrote to memory of 2208 5980 JaffaCakes118_b7f370b70ab5371c554c8bca0783ba7c.exe 87 PID 5980 wrote to memory of 2208 5980 JaffaCakes118_b7f370b70ab5371c554c8bca0783ba7c.exe 87 PID 5980 wrote to memory of 2208 5980 JaffaCakes118_b7f370b70ab5371c554c8bca0783ba7c.exe 87 PID 5980 wrote to memory of 2208 5980 JaffaCakes118_b7f370b70ab5371c554c8bca0783ba7c.exe 87 PID 5980 wrote to memory of 2208 5980 JaffaCakes118_b7f370b70ab5371c554c8bca0783ba7c.exe 87 PID 5980 wrote to memory of 2208 5980 JaffaCakes118_b7f370b70ab5371c554c8bca0783ba7c.exe 87 PID 2208 wrote to memory of 1584 2208 JaffaCakes118_b7f370b70ab5371c554c8bca0783ba7c.exe 88 PID 2208 wrote to memory of 1584 2208 JaffaCakes118_b7f370b70ab5371c554c8bca0783ba7c.exe 88 PID 2208 wrote to memory of 1584 2208 JaffaCakes118_b7f370b70ab5371c554c8bca0783ba7c.exe 88 PID 1584 wrote to memory of 4756 1584 service227.exe 93 PID 1584 wrote to memory of 4756 1584 service227.exe 93 PID 1584 wrote to memory of 4756 1584 service227.exe 93 PID 1584 wrote to memory of 4756 1584 service227.exe 93 PID 1584 wrote to memory of 4756 1584 service227.exe 93 PID 1584 wrote to memory of 4756 1584 service227.exe 93 PID 1584 wrote to memory of 4756 1584 service227.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b7f370b70ab5371c554c8bca0783ba7c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b7f370b70ab5371c554c8bca0783ba7c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5980 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b7f370b70ab5371c554c8bca0783ba7c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b7f370b70ab5371c554c8bca0783ba7c.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\service227.exe-n3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\service227.exe-n4⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- System Location Discovery: System Language Discovery
PID:4756
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysWOW64\service227.exe1⤵PID:1056
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysWOW64\service227.exe1⤵PID:5732
Network
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5b7f370b70ab5371c554c8bca0783ba7c
SHA194a031951b19b7e5a8459dec49da99877e33c744
SHA256596397cadce5ecdb769d02c7df256867b0e51becc34469df0cc70572f34716bf
SHA5121e3504c3b41aafeba0dcea470a8cb93ec3685813b953f0468828db94f6aabfa4fa967e0cb849fe7e5a855145e5af32fddc6d9921e3ee158de0096737ff74b935