Analysis

  • max time kernel
    147s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-01-2025 10:39

General

  • Target

    JaffaCakes118_3ebb862c97601534381543e2af2438e6.exe

  • Size

    991KB

  • MD5

    3ebb862c97601534381543e2af2438e6

  • SHA1

    b89e324e508483914d79042b1c4608113598c3ba

  • SHA256

    c2c884ef07ae7a277d4719ebe2ab7d8cea33258a12d6a7655da321310cbff945

  • SHA512

    726e95cb4176b07d73565a304d078f25747324516be3e98867526f299b0e52c79a25c3b32f2028455424b42891a81130258d02774979d5ab1453af7dc37ff59d

  • SSDEEP

    24576:pk7W/7LuNtRdZ5mHCav1rKR2AibdY1x1eakBv:gW/OXoCav1O401eak

Malware Config

Signatures

  • Blackshades

    Blackshades is a remote access trojan with various capabilities.

  • Blackshades family
  • Blackshades payload 16 IoCs
  • Modifies firewall policy service 3 TTPs 8 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3ebb862c97601534381543e2af2438e6.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3ebb862c97601534381543e2af2438e6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3ebb862c97601534381543e2af2438e6.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3ebb862c97601534381543e2af2438e6.exe"
      2⤵
      • Adds policy Run key to start application
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Users\Admin\AppData\Local\Temp\XR6WS1TLWCEL.exe
        C:\Users\Admin\AppData\Local\Temp\XR6WS1TLWCEL.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2220
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2184
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2828
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3ebb862c97601534381543e2af2438e6.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3ebb862c97601534381543e2af2438e6.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1804
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3ebb862c97601534381543e2af2438e6.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3ebb862c97601534381543e2af2438e6.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2912
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2280
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2712
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2768
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:1836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\XR6WS1TLWCEL.exe

    Filesize

    531KB

    MD5

    5d39ad9a81a7b0f6f24fa09d15bc1c62

    SHA1

    abfe8a0f854a92befc97cb3eb0d950d2b6c09d73

    SHA256

    adfa02fde7c3f9d78dd6a0237ec2d3ec021ab5e9ee450ebf47ddb9c671f874a3

    SHA512

    144184a1eeef01fbf091d26004ae3af233ed0aafca5e15dc69e27c217224423689614004409691d6c6056a91d57755cf78895d0f50ebc4ecf3018b4677ccbe48

  • memory/2084-35-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/2084-42-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/2084-34-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/2084-8-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/2084-2-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/2084-4-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/2084-7-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/2084-26-0x0000000002730000-0x00000000027B8000-memory.dmp

    Filesize

    544KB

  • memory/2084-25-0x0000000002730000-0x00000000027B8000-memory.dmp

    Filesize

    544KB

  • memory/2084-53-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/2084-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2084-54-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/2084-33-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/2084-37-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/2084-38-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/2084-40-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/2084-12-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/2084-43-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/2084-46-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/2084-47-0x0000000002730000-0x00000000027B8000-memory.dmp

    Filesize

    544KB

  • memory/2084-48-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/2220-36-0x0000000000400000-0x0000000000488000-memory.dmp

    Filesize

    544KB

  • memory/2220-28-0x0000000000400000-0x0000000000488000-memory.dmp

    Filesize

    544KB