Analysis

  • max time kernel
    149s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-01-2025 04:49

General

  • Target

    JaffaCakes118_3c1d6ad373cdc239dfbdaf555d8d3f2a.exe

  • Size

    11.3MB

  • MD5

    3c1d6ad373cdc239dfbdaf555d8d3f2a

  • SHA1

    78433e8da67df308f68f74ed8fa1eb275ab817fe

  • SHA256

    07f25d50689a1a07aeca1b346a219ca71ed618fc1faf2f15ef2f3a76a75d8242

  • SHA512

    00f381355693e745b157166a00f5183b3c61f9a9088abc0d5d3d3c1203e5a68688c7f688aa8a6186ff29c29d9a33b08adfa58000f72153f28f8c55991426e1ac

  • SSDEEP

    196608:HlFv81RU6deokkHSWFgAj2X4+6xHZVujIT:HL81RNdeDkHSWjj2X4+MHme

Malware Config

Signatures

  • Blackshades

    Blackshades is a remote access trojan with various capabilities.

  • Blackshades family
  • Blackshades payload 16 IoCs
  • Modifies firewall policy service 3 TTPs 10 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3c1d6ad373cdc239dfbdaf555d8d3f2a.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3c1d6ad373cdc239dfbdaf555d8d3f2a.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4816
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      C:\Users\Admin\AppData\Roaming\svchost.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4628
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3256
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:4996
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3020
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:4532
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4808
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2040
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\microsoft\lsd.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\microsoft\lsd.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3536
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\microsoft\lsd.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\microsoft\lsd.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:5096
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      C:\Users\Admin\AppData\Roaming\svchost.exe
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1384
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 904
        3⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:540
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3c1d6ad373cdc239dfbdaf555d8d3f2a.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3c1d6ad373cdc239dfbdaf555d8d3f2a.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4828
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        C:\Users\Admin\AppData\Roaming\svchost.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3624
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        C:\Users\Admin\AppData\Roaming\svchost.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4544
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
          dw20.exe -x -s 876
          4⤵
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:4284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\svchost.exe.log

    Filesize

    223B

    MD5

    cde6529abeea500fb852f29ba0da6115

    SHA1

    45f2f48492417ae6a0eade8aaa808d3d1d760743

    SHA256

    d7f4964443470b6729865676d76f5f1f416da633033071c34ea5eb19cdea53b5

    SHA512

    c95fa7faf6a90f32060dba70f79c4d66c68d6eec587306fb98f36fc3ba5d377ebf9dabf47298b71db208fb10f7ccb4e0ed82236c8f26bcc746552588bbb38234

  • C:\Users\Admin\AppData\Roaming\svchost.exe

    Filesize

    3.6MB

    MD5

    da58836942e87077da867e7bd15a8980

    SHA1

    d10cb5dac2ef1a1f605df36cb43aed09ca3bb99e

    SHA256

    8f34741996cad16495b29a74f75cb2f911bbea44817d54b8b3331a26e6eae355

    SHA512

    42a3d68f2df65bcf10046d5d0da1f2c43f73dd7a0830c43c9ebbc7f5cab95bb6924bc8de7fde275da85ee46b265ad8b8a0aef96aa507908281d90803eee532c5

  • memory/1384-65-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1384-57-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1384-12-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1384-15-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1384-16-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1384-14-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1384-18-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3624-39-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4544-55-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4628-53-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4628-87-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4628-104-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4628-101-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4628-97-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4628-94-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4628-91-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4628-71-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4628-10-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4628-6-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4628-84-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4628-80-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4628-60-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4628-77-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4628-74-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/4816-0-0x00000000748C2000-0x00000000748C3000-memory.dmp

    Filesize

    4KB

  • memory/4816-1-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/4816-2-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/4816-52-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/4816-51-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/4816-50-0x00000000748C2000-0x00000000748C3000-memory.dmp

    Filesize

    4KB

  • memory/4828-59-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/4828-58-0x00000000748C2000-0x00000000748C3000-memory.dmp

    Filesize

    4KB

  • memory/4828-22-0x00000000748C2000-0x00000000748C3000-memory.dmp

    Filesize

    4KB

  • memory/4828-26-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB

  • memory/4828-23-0x00000000748C0000-0x0000000074E71000-memory.dmp

    Filesize

    5.7MB