Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
29-07-2024 10:29
Static task
static1
Behavioral task
behavioral1
Sample
40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe
-
Size
261KB
-
MD5
40bacc2a14f96df432eaf6427353a84d
-
SHA1
725676d96a957828af4f8b8d77ea31a5ddb8082b
-
SHA256
d0fbae20fae407e408788e2d4867944f20a54ce161b00400d05d0b1f767b6560
-
SHA512
acca8e6e9c971e4195c0f43e97ff5d37fdd04ede934b904ca3489898f23d869bf1cd56c24917d080b003d13ce2ed319b54789e7ccc90121e24abafcb227bce04
-
SSDEEP
3072:8Z/S0A2TcuWTnTn43rXCxOoeiJFu/xCGHZMUBjlW7U2xQ8zEOC11jry:uTtm2W4oX0CG+EIvi8zA11H
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
xiluom.exexiluom.exepid Process 2044 xiluom.exe 3568 xiluom.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
xiluom.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Xiluom = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Domaxu\\xiluom.exe" xiluom.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exexiluom.exe40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exedescription pid Process procid_target PID 4208 set thread context of 4132 4208 40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe 88 PID 2044 set thread context of 3568 2044 xiluom.exe 90 PID 4132 set thread context of 4664 4132 40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
xiluom.exe40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exexiluom.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xiluom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xiluom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exexiluom.exepid Process 4132 40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe 4132 40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe 3568 xiluom.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exexiluom.exexiluom.exedescription pid Process procid_target PID 4208 wrote to memory of 4568 4208 40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe 87 PID 4208 wrote to memory of 4568 4208 40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe 87 PID 4208 wrote to memory of 4568 4208 40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe 87 PID 4208 wrote to memory of 4132 4208 40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe 88 PID 4208 wrote to memory of 4132 4208 40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe 88 PID 4208 wrote to memory of 4132 4208 40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe 88 PID 4208 wrote to memory of 4132 4208 40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe 88 PID 4208 wrote to memory of 4132 4208 40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe 88 PID 4208 wrote to memory of 4132 4208 40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe 88 PID 4208 wrote to memory of 4132 4208 40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe 88 PID 4208 wrote to memory of 4132 4208 40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe 88 PID 4208 wrote to memory of 4132 4208 40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe 88 PID 4132 wrote to memory of 2044 4132 40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe 89 PID 4132 wrote to memory of 2044 4132 40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe 89 PID 4132 wrote to memory of 2044 4132 40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe 89 PID 2044 wrote to memory of 3568 2044 xiluom.exe 90 PID 2044 wrote to memory of 3568 2044 xiluom.exe 90 PID 2044 wrote to memory of 3568 2044 xiluom.exe 90 PID 2044 wrote to memory of 3568 2044 xiluom.exe 90 PID 2044 wrote to memory of 3568 2044 xiluom.exe 90 PID 2044 wrote to memory of 3568 2044 xiluom.exe 90 PID 2044 wrote to memory of 3568 2044 xiluom.exe 90 PID 2044 wrote to memory of 3568 2044 xiluom.exe 90 PID 2044 wrote to memory of 3568 2044 xiluom.exe 90 PID 3568 wrote to memory of 3060 3568 xiluom.exe 51 PID 3568 wrote to memory of 3060 3568 xiluom.exe 51 PID 3568 wrote to memory of 3060 3568 xiluom.exe 51 PID 3568 wrote to memory of 3060 3568 xiluom.exe 51 PID 3568 wrote to memory of 3060 3568 xiluom.exe 51 PID 3568 wrote to memory of 864 3568 xiluom.exe 52 PID 3568 wrote to memory of 864 3568 xiluom.exe 52 PID 3568 wrote to memory of 864 3568 xiluom.exe 52 PID 3568 wrote to memory of 864 3568 xiluom.exe 52 PID 3568 wrote to memory of 864 3568 xiluom.exe 52 PID 3568 wrote to memory of 3080 3568 xiluom.exe 53 PID 3568 wrote to memory of 3080 3568 xiluom.exe 53 PID 3568 wrote to memory of 3080 3568 xiluom.exe 53 PID 3568 wrote to memory of 3080 3568 xiluom.exe 53 PID 3568 wrote to memory of 3080 3568 xiluom.exe 53 PID 3568 wrote to memory of 3444 3568 xiluom.exe 56 PID 3568 wrote to memory of 3444 3568 xiluom.exe 56 PID 3568 wrote to memory of 3444 3568 xiluom.exe 56 PID 3568 wrote to memory of 3444 3568 xiluom.exe 56 PID 3568 wrote to memory of 3444 3568 xiluom.exe 56 PID 3568 wrote to memory of 3556 3568 xiluom.exe 57 PID 3568 wrote to memory of 3556 3568 xiluom.exe 57 PID 3568 wrote to memory of 3556 3568 xiluom.exe 57 PID 3568 wrote to memory of 3556 3568 xiluom.exe 57 PID 3568 wrote to memory of 3556 3568 xiluom.exe 57 PID 3568 wrote to memory of 3744 3568 xiluom.exe 58 PID 3568 wrote to memory of 3744 3568 xiluom.exe 58 PID 3568 wrote to memory of 3744 3568 xiluom.exe 58 PID 3568 wrote to memory of 3744 3568 xiluom.exe 58 PID 3568 wrote to memory of 3744 3568 xiluom.exe 58 PID 3568 wrote to memory of 3840 3568 xiluom.exe 59 PID 3568 wrote to memory of 3840 3568 xiluom.exe 59 PID 3568 wrote to memory of 3840 3568 xiluom.exe 59 PID 3568 wrote to memory of 3840 3568 xiluom.exe 59 PID 3568 wrote to memory of 3840 3568 xiluom.exe 59 PID 3568 wrote to memory of 3908 3568 xiluom.exe 60 PID 3568 wrote to memory of 3908 3568 xiluom.exe 60 PID 3568 wrote to memory of 3908 3568 xiluom.exe 60 PID 3568 wrote to memory of 3908 3568 xiluom.exe 60 PID 3568 wrote to memory of 3908 3568 xiluom.exe 60
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3060
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:864
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:3080
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe"3⤵PID:4568
-
-
C:\Users\Admin\AppData\Local\Temp\40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\40bacc2a14f96df432eaf6427353a84d_JaffaCakes118.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\Domaxu\xiluom.exe"C:\Users\Admin\AppData\Local\Temp\Domaxu\xiluom.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\Domaxu\xiluom.exe"C:\Users\Admin\AppData\Local\Temp\Domaxu\xiluom.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3568
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\HOSD016.bat"4⤵
- System Location Discovery: System Language Discovery
PID:4664
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3556
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3744
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3840
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3908
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3992
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4188
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:1272
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2632
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:732
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2316
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3284
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1828
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1496
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:712
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:4644
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:4008
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
261KB
MD5b31d65441c04e6fe357eabd0533b3b28
SHA1264b21fddb99296830e497b1c5e3060626de871a
SHA25668763794185a6424d196074370c06637510c3c18625b3fe5526df404038a449f
SHA512014c1f1f337f8c60387f8b0b370a73fda78d02cef2565674818671f16ff6f542ff80a7e6e79754701fd4ebc4220262490445fc2e312ba094edbd0de88ede93b0
-
Filesize
244B
MD5eb149e6fecf7bdec493f0d291f3b4269
SHA1931daf01fa661ca008d8bf852e8fffc06fdbf999
SHA25629b1d38502a9ee6b2629d519ec6a59dae9c22418095f3bcbf92f60a850f3062d
SHA5129c3ab83c9c44d3a205f510a6fcfe1b184471c7ee4671d4b7106b13ea6ba32645f2e1cb089371544e21e2e56e341e09e0f36aec4e5538566ebb1fba6e950c5345