Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 15:41
Behavioral task
behavioral1
Sample
JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe
-
Size
336KB
-
MD5
2d220abbec85cf9f7bd72b36969880fc
-
SHA1
58cc4a0df23b58fa4b49af74f369b9de88d346fb
-
SHA256
356f8192676cbf3f4b1ed91fe9af0484dab3b36f7a7152eab61c4bb240e09eb9
-
SHA512
d3b94e431f0e14957ca6914bb0cdffb474987429c1ed39d11d1e1b2ff7fb3cda6d29a2bd2582208fe7bf946d056362a5a7eff43f14c44bc34a031164581d05a3
-
SSDEEP
6144:6iu0srKxP6nVMg1FENy/V/5c6thb+lazG8j:650srcyLjN/5c6thb+lazGe
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 1 IoCs
resource yara_rule behavioral2/memory/4436-6-0x0000000077100000-0x00000000771F0000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\RSBotsPro.exe = "C:\\Users\\Admin\\AppData\\Roaming\\RSBotsPro.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 1132 reg.exe 4172 reg.exe 1360 reg.exe 4084 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeCreateTokenPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeAssignPrimaryTokenPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeLockMemoryPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeIncreaseQuotaPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeMachineAccountPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeTcbPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeSecurityPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeTakeOwnershipPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeLoadDriverPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeSystemProfilePrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeSystemtimePrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeProfSingleProcessPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeIncBasePriorityPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeCreatePagefilePrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeCreatePermanentPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeBackupPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeRestorePrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeShutdownPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeDebugPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeAuditPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeSystemEnvironmentPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeChangeNotifyPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeRemoteShutdownPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeUndockPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeSyncAgentPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeEnableDelegationPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeManageVolumePrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeImpersonatePrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeCreateGlobalPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: 31 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: 32 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: 33 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: 34 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: 35 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe Token: SeDebugPrivilege 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4436 wrote to memory of 3956 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe 82 PID 4436 wrote to memory of 3956 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe 82 PID 4436 wrote to memory of 3956 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe 82 PID 4436 wrote to memory of 2776 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe 83 PID 4436 wrote to memory of 2776 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe 83 PID 4436 wrote to memory of 2776 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe 83 PID 4436 wrote to memory of 4928 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe 84 PID 4436 wrote to memory of 4928 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe 84 PID 4436 wrote to memory of 4928 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe 84 PID 4436 wrote to memory of 4948 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe 85 PID 4436 wrote to memory of 4948 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe 85 PID 4436 wrote to memory of 4948 4436 JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe 85 PID 3956 wrote to memory of 4084 3956 cmd.exe 90 PID 3956 wrote to memory of 4084 3956 cmd.exe 90 PID 3956 wrote to memory of 4084 3956 cmd.exe 90 PID 4948 wrote to memory of 1132 4948 cmd.exe 91 PID 4948 wrote to memory of 1132 4948 cmd.exe 91 PID 4948 wrote to memory of 1132 4948 cmd.exe 91 PID 4928 wrote to memory of 1360 4928 cmd.exe 92 PID 4928 wrote to memory of 1360 4928 cmd.exe 92 PID 4928 wrote to memory of 1360 4928 cmd.exe 92 PID 2776 wrote to memory of 4172 2776 cmd.exe 93 PID 2776 wrote to memory of 4172 2776 cmd.exe 93 PID 2776 wrote to memory of 4172 2776 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4084
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe:*:Enabled:Windows Messanger" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2d220abbec85cf9f7bd72b36969880fc.exe:*:Enabled:Windows Messanger" /f3⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4172
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1360
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\RSBotsPro.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\RSBotsPro.exe:*:Enabled:Windows Messanger" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\RSBotsPro.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\RSBotsPro.exe:*:Enabled:Windows Messanger" /f3⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1132
-
-