Analysis

  • max time kernel
    147s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-01-2025 10:39

General

  • Target

    JaffaCakes118_3ebb862c97601534381543e2af2438e6.exe

  • Size

    991KB

  • MD5

    3ebb862c97601534381543e2af2438e6

  • SHA1

    b89e324e508483914d79042b1c4608113598c3ba

  • SHA256

    c2c884ef07ae7a277d4719ebe2ab7d8cea33258a12d6a7655da321310cbff945

  • SHA512

    726e95cb4176b07d73565a304d078f25747324516be3e98867526f299b0e52c79a25c3b32f2028455424b42891a81130258d02774979d5ab1453af7dc37ff59d

  • SSDEEP

    24576:pk7W/7LuNtRdZ5mHCav1rKR2AibdY1x1eakBv:gW/OXoCav1O401eak

Malware Config

Signatures

  • Blackshades

    Blackshades is a remote access trojan with various capabilities.

  • Blackshades family
  • Blackshades payload 17 IoCs
  • Modifies firewall policy service 3 TTPs 10 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3ebb862c97601534381543e2af2438e6.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3ebb862c97601534381543e2af2438e6.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3260
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3ebb862c97601534381543e2af2438e6.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3ebb862c97601534381543e2af2438e6.exe"
      2⤵
      • Adds policy Run key to start application
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1056
      • C:\Users\Admin\AppData\Local\Temp\P6N5QYTBFG.exe
        C:\Users\Admin\AppData\Local\Temp\P6N5QYTBFG.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4880
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1960
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2560
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3ebb862c97601534381543e2af2438e6.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3ebb862c97601534381543e2af2438e6.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2276
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3ebb862c97601534381543e2af2438e6.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3ebb862c97601534381543e2af2438e6.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:3232
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4268
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:4144
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2876
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:5000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\P6N5QYTBFG.exe

    Filesize

    531KB

    MD5

    5d39ad9a81a7b0f6f24fa09d15bc1c62

    SHA1

    abfe8a0f854a92befc97cb3eb0d950d2b6c09d73

    SHA256

    adfa02fde7c3f9d78dd6a0237ec2d3ec021ab5e9ee450ebf47ddb9c671f874a3

    SHA512

    144184a1eeef01fbf091d26004ae3af233ed0aafca5e15dc69e27c217224423689614004409691d6c6056a91d57755cf78895d0f50ebc4ecf3018b4677ccbe48

  • memory/1056-46-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/1056-61-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/1056-24-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/1056-17-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/1056-27-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/1056-19-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/1056-20-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/1056-21-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/1056-58-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/1056-5-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/1056-34-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/1056-31-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/1056-37-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/1056-43-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/1056-2-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/1056-49-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/1056-52-0x0000000000400000-0x000000000045008B-memory.dmp

    Filesize

    320KB

  • memory/4880-13-0x0000000000400000-0x0000000000488000-memory.dmp

    Filesize

    544KB

  • memory/4880-18-0x0000000000400000-0x0000000000488000-memory.dmp

    Filesize

    544KB