Analysis

  • max time kernel
    149s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-01-2025 23:35

General

  • Target

    JaffaCakes118_44b413573fcee76fb8ddc89babeefa64.exe

  • Size

    636KB

  • MD5

    44b413573fcee76fb8ddc89babeefa64

  • SHA1

    a9f97f73919df6939e17c13837db8a3d0053a9d5

  • SHA256

    11ffed9018beb1d8d5a1ef15ebb557a7ac22ec83beed9939b9eeac442c7ac9d8

  • SHA512

    cc482c9137b7dec09f8f4699fae1f04c0b2a65c15a79ac4d36651efb46d56b089de823606badb4306153bfa7c30e7951c3d8618bb2a962c5b178f74d0d2dbaaa

  • SSDEEP

    12288:5npmU4F1zUNNv+84xg2t0/6zvc2VY4PXkSvxEK3I1UMTtWGYByDzeq4:7m/1zUnv+84Odyvc2VdcSZE9TT3m

Malware Config

Signatures

  • Blackshades

    Blackshades is a remote access trojan with various capabilities.

  • Blackshades family
  • Blackshades payload 11 IoCs
  • Modifies firewall policy service 3 TTPs 10 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44b413573fcee76fb8ddc89babeefa64.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_44b413573fcee76fb8ddc89babeefa64.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3692
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      C:\Users\Admin\AppData\Roaming\svchost.exe
      2⤵
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4684
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2192
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:3760
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5060
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:5016
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:4940
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\nouacGP.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\nouacGP.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:664
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\nouacGP.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\nouacGP.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\WindowsCodecs.dll

    Filesize

    15KB

    MD5

    8d0a509b3ff7eb2945424f5f11474a0f

    SHA1

    a781cda1d9225095bbfcf7198d932146df6ab83a

    SHA256

    65c7dd8f275c90f5c65ac207c11735868b15a27ab6d692f2169af38b2672db4e

    SHA512

    d76c4718a890cadbc03fac07d8c31703645cac70be51250198f4ee83189addbe27252a5553100911d2d591440cf5bd54e075264e78609df864bf92bf334d0c3b

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    16KB

    MD5

    6711d190e743eb94c5901ce746d27570

    SHA1

    e17c39a719ca57e22721af9648a50f979aa27bdc

    SHA256

    33f04b3a470ac1c6fee1bb4c3cfeecb11dbaf1bb071bd22201f3c024b96d9a41

    SHA512

    5a00feb4d998170939a878d690c8cf03a424df61576e0d98ac11933cd3979e0668fecf40a5e4d68be10a7a941d6cc46d0f419b1f3fc79530888586aac446c5dd

  • memory/3692-31-0x0000000074850000-0x0000000074E01000-memory.dmp

    Filesize

    5.7MB

  • memory/3692-0-0x0000000074852000-0x0000000074853000-memory.dmp

    Filesize

    4KB

  • memory/3692-1-0x0000000074850000-0x0000000074E01000-memory.dmp

    Filesize

    5.7MB

  • memory/3692-2-0x0000000074850000-0x0000000074E01000-memory.dmp

    Filesize

    5.7MB

  • memory/3692-32-0x0000000074850000-0x0000000074E01000-memory.dmp

    Filesize

    5.7MB

  • memory/3692-30-0x0000000074852000-0x0000000074853000-memory.dmp

    Filesize

    4KB

  • memory/4684-34-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/4684-20-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/4684-33-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/4684-16-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/4684-38-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/4684-40-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/4684-42-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/4684-44-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/4684-46-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/4684-47-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/4684-50-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB