Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-01-2025 16:44

General

  • Target

    JaffaCakes118_2da2d1d1b683e7c7420a3c8a3504816a.exe

  • Size

    715KB

  • MD5

    2da2d1d1b683e7c7420a3c8a3504816a

  • SHA1

    336c63dc6691bf9da41d88e26c2b06178a3b1d68

  • SHA256

    624fd6e2054304b8779e40a6d9df8bcac89f1c6b066359650b1ffed52abcb3f4

  • SHA512

    21db30b0a43ae615b8095a2dce69835fb47d76cbfa4a5d8a43a5892eda824b60012d1632746b48515a99849542fd1f0b9b45926b60b057a1fb974a61329d0067

  • SSDEEP

    12288:v6qu/l5LbKkJ4JKIe2L9QKkRoaPqCYLGuMmmHgMW2RYw5xaix2tgeFh3qRgG7Cen:/aKrJKRrb456RTtSdj

Malware Config

Signatures

  • Blackshades

    Blackshades is a remote access trojan with various capabilities.

  • Blackshades family
  • Blackshades payload 14 IoCs
  • Modifies firewall policy service 3 TTPs 10 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2da2d1d1b683e7c7420a3c8a3504816a.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2da2d1d1b683e7c7420a3c8a3504816a.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\AppData\Roaming\explorer.exe
      C:\Users\Admin\AppData\Roaming\explorer.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3192
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1432
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:1744
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\explorer.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\explorer.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3428
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\explorer.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\explorer.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:3712
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4356
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:1928
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\c.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\c.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4616
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\c.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\c.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:3384
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2da2d1d1b683e7c7420a3c8a3504816a.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2da2d1d1b683e7c7420a3c8a3504816a.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1760
      • C:\Users\Admin\AppData\Roaming\explorer.exe
        C:\Users\Admin\AppData\Roaming\explorer.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\explorer.exe

    Filesize

    1KB

    MD5

    8db91eec5a9f8eb00597752f0d48d929

    SHA1

    1dde93970248e2c106ff4268c8c2dba9e9cc545c

    SHA256

    7392259d3708340eb83609c5d316b46b9e8c8dabee458356a65f82382aff8949

    SHA512

    95013119d062366b2fd6f604a765635b854480e8649f2b6b1b0a9eb67ad1888154ba84a8c19b89567b03c46974c6b77de1e72454ac1f47071729748907af166d

  • memory/1760-15-0x0000000074D80000-0x0000000075331000-memory.dmp

    Filesize

    5.7MB

  • memory/1760-33-0x0000000074D80000-0x0000000075331000-memory.dmp

    Filesize

    5.7MB

  • memory/1760-32-0x0000000074D82000-0x0000000074D83000-memory.dmp

    Filesize

    4KB

  • memory/1760-16-0x0000000074D80000-0x0000000075331000-memory.dmp

    Filesize

    5.7MB

  • memory/1760-14-0x0000000074D82000-0x0000000074D83000-memory.dmp

    Filesize

    4KB

  • memory/2052-24-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2156-30-0x0000000074D80000-0x0000000075331000-memory.dmp

    Filesize

    5.7MB

  • memory/2156-2-0x0000000074D80000-0x0000000075331000-memory.dmp

    Filesize

    5.7MB

  • memory/2156-1-0x0000000074D80000-0x0000000075331000-memory.dmp

    Filesize

    5.7MB

  • memory/2156-28-0x0000000074D82000-0x0000000074D83000-memory.dmp

    Filesize

    4KB

  • memory/2156-29-0x0000000074D80000-0x0000000075331000-memory.dmp

    Filesize

    5.7MB

  • memory/2156-0-0x0000000074D82000-0x0000000074D83000-memory.dmp

    Filesize

    4KB

  • memory/3192-34-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/3192-31-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/3192-6-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/3192-10-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/3192-35-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/3192-39-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/3192-42-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/3192-45-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/3192-49-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/3192-52-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/3192-55-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/3192-62-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/3192-72-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB