Malware Analysis Report

2025-04-03 10:16

Sample ID 250201-25exssvkb1
Target 80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe
SHA256 80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2
Tags
defense_evasion discovery persistence upx blackshades rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2

Threat Level: Known bad

The file 80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe was found to be: Known bad.

Malicious Activity Summary

defense_evasion discovery persistence upx blackshades rat

Blackshades

Blackshades payload

Blackshades family

Modifies firewall policy service

Loads dropped DLL

Checks computer location settings

Executes dropped EXE

Adds Run key to start application

UPX packed file

Suspicious use of SetThreadContext

System Location Discovery: System Language Discovery

Unsigned PE

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Modifies registry key

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-02-01 23:09

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-02-01 23:09

Reported

2025-02-01 23:11

Platform

win7-20240903-en

Max time kernel

119s

Max time network

114s

Command Line

"C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe"

Signatures

Modifies firewall policy service

defense_evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" C:\Windows\SysWOW64\reg.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List C:\Windows\SysWOW64\reg.exe N/A
Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\svchost.exe = "C:\\Windows\\SysWOW64\\svchost.exe:*:Enabled:Windows Messanger" C:\Windows\SysWOW64\reg.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List C:\Windows\SysWOW64\reg.exe N/A
Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\RUNE.exe = "C:\\Users\\Admin\\AppData\\Roaming\\RUNE.exe:*:Enabled:Windows Messanger" C:\Windows\SysWOW64\reg.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile C:\Windows\SysWOW64\reg.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" C:\Windows\SysWOW64\reg.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile C:\Windows\SysWOW64\reg.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Jload = "C:\\Users\\Admin\\AppData\\Roaming\\Jload\\Jload.exe" C:\Windows\SysWOW64\reg.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\reg.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\reg.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\svchost.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\reg.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\reg.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\reg.exe N/A

Modifies registry key

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\reg.exe N/A
N/A N/A C:\Windows\SysWOW64\reg.exe N/A
N/A N/A C:\Windows\SysWOW64\reg.exe N/A
N/A N/A C:\Windows\SysWOW64\reg.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: 1 N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeCreateTokenPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeTcbPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeCreatePermanentPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeSyncAgentPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeEnableDelegationPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeImpersonatePrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: 31 N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: 32 N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2476 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe
PID 2476 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe
PID 2476 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe
PID 2476 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe
PID 2476 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe
PID 2476 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe
PID 2476 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe
PID 2476 wrote to memory of 2708 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe
PID 2708 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Windows\SysWOW64\cmd.exe
PID 2708 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Windows\SysWOW64\cmd.exe
PID 2708 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Windows\SysWOW64\cmd.exe
PID 2708 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Windows\SysWOW64\cmd.exe
PID 2516 wrote to memory of 1812 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2516 wrote to memory of 1812 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2516 wrote to memory of 1812 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2516 wrote to memory of 1812 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2708 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 2708 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 2708 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 2708 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 1984 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 1984 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 1984 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 1984 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 1984 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 1984 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 1984 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 1984 wrote to memory of 2504 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 1984 wrote to memory of 632 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Windows\SysWOW64\svchost.exe
PID 1984 wrote to memory of 632 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Windows\SysWOW64\svchost.exe
PID 1984 wrote to memory of 632 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Windows\SysWOW64\svchost.exe
PID 1984 wrote to memory of 632 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Windows\SysWOW64\svchost.exe
PID 1984 wrote to memory of 632 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Windows\SysWOW64\svchost.exe
PID 1984 wrote to memory of 632 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Windows\SysWOW64\svchost.exe
PID 1984 wrote to memory of 632 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Windows\SysWOW64\svchost.exe
PID 1984 wrote to memory of 632 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Windows\SysWOW64\svchost.exe
PID 632 wrote to memory of 2396 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 632 wrote to memory of 2396 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 632 wrote to memory of 2396 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 632 wrote to memory of 2396 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 632 wrote to memory of 2648 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 632 wrote to memory of 2648 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 632 wrote to memory of 2648 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 632 wrote to memory of 2648 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 632 wrote to memory of 1668 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 632 wrote to memory of 1668 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 632 wrote to memory of 1668 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 632 wrote to memory of 1668 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 632 wrote to memory of 2020 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 632 wrote to memory of 2020 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 632 wrote to memory of 2020 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 632 wrote to memory of 2020 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 2396 wrote to memory of 2200 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2396 wrote to memory of 2200 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2396 wrote to memory of 2200 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2396 wrote to memory of 2200 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2648 wrote to memory of 2988 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2648 wrote to memory of 2988 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2648 wrote to memory of 2988 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2648 wrote to memory of 2988 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2020 wrote to memory of 1688 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2020 wrote to memory of 1688 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2020 wrote to memory of 1688 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2020 wrote to memory of 1688 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe

Processes

C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe

"C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe"

C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe

"C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\NJKVS.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Jload" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Jload\Jload.exe" /f

C:\Users\Admin\AppData\Roaming\Jload\Jload.exe

"C:\Users\Admin\AppData\Roaming\Jload\Jload.exe"

C:\Users\Admin\AppData\Roaming\Jload\Jload.exe

"C:\Users\Admin\AppData\Roaming\Jload\Jload.exe"

C:\Windows\SysWOW64\svchost.exe

"C:\Windows\system32\svchost.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f

C:\Windows\SysWOW64\cmd.exe

cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\SysWOW64\svchost.exe" /t REG_SZ /d "C:\Windows\SysWOW64\svchost.exe:*:Enabled:Windows Messanger" /f

C:\Windows\SysWOW64\cmd.exe

cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f

C:\Windows\SysWOW64\cmd.exe

cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\RUNE.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\RUNE.exe:*:Enabled:Windows Messanger" /f

C:\Windows\SysWOW64\reg.exe

REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f

C:\Windows\SysWOW64\reg.exe

REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\SysWOW64\svchost.exe" /t REG_SZ /d "C:\Windows\SysWOW64\svchost.exe:*:Enabled:Windows Messanger" /f

C:\Windows\SysWOW64\reg.exe

REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\RUNE.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\RUNE.exe:*:Enabled:Windows Messanger" /f

C:\Windows\SysWOW64\reg.exe

REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f

Network

Country Destination Domain Proto
US 8.8.8.8:53 xdarkx.zapto.org udp
US 8.8.8.8:53 1xdarkx.zapto.org udp
US 8.8.8.8:53 2xdarkx.zapto.org udp
US 8.8.8.8:53 3xdarkx.zapto.org udp
ES 94.73.32.235:3082 3xdarkx.zapto.org tcp
US 8.8.8.8:53 4xdarkx.zapto.org udp
US 8.8.8.8:53 5xdarkx.zapto.org udp
US 8.8.8.8:53 6xdarkx.zapto.org udp

Files

memory/2476-2-0x00000000001C0000-0x00000000001C1000-memory.dmp

memory/2476-75-0x00000000005D0000-0x00000000005D1000-memory.dmp

memory/2708-430-0x0000000000400000-0x000000000040B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\NJKVS.bat

MD5 bc18986a524cd5015b00135cbf312330
SHA1 65c0fa726aa3b129e2d94a5518186c3cd866f3c0
SHA256 f27d92575749ef19cccc68a524662607f5be5ed2fb415fe7de4f4927f521709c
SHA512 afae8a27a1c64fedd75e9786bbeb4fc8c21795bb2cfd23a749e8de3f102977b391186597d8892cce7be71360b264b22c38a2eaf9507375c1d4e75a5586e8db2e

\Users\Admin\AppData\Roaming\Jload\Jload.exe

MD5 21d3a1576ab734f88c7567119bb89df2
SHA1 b6bc5afcbd589457ba076fc487a51f3448954e31
SHA256 abb1890feb94915be0c12e0c088e31f06ee21cd16038ac9f03b54ecfd4b17c94
SHA512 9dfb4eff1b2711b35fe8a067eeeb882bcdfe33a642aa037d7173cebefb5360cff5a3c9c87e40f6c36104d0b38f1f226492a7020473bd79af3bbc4a398692a0b4

memory/2504-975-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2708-997-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2504-1001-0x0000000000400000-0x000000000040B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2025-02-01 23:09

Reported

2025-02-01 23:11

Platform

win10v2004-20250129-en

Max time kernel

119s

Max time network

114s

Command Line

"C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe"

Signatures

Blackshades

rat blackshades

Blackshades family

blackshades

Blackshades payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Modifies firewall policy service

defense_evasion
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile C:\Windows\SysWOW64\reg.exe N/A
Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\RUNE.exe = "C:\\Users\\Admin\\AppData\\Roaming\\RUNE.exe:*:Enabled:Windows Messanger" C:\Windows\SysWOW64\reg.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile C:\Windows\SysWOW64\reg.exe N/A
Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\svchost.exe = "C:\\Windows\\SysWOW64\\svchost.exe:*:Enabled:Windows Messanger" C:\Windows\SysWOW64\reg.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile C:\Windows\SysWOW64\reg.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" C:\Windows\SysWOW64\reg.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List C:\Windows\SysWOW64\reg.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications C:\Windows\SysWOW64\reg.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" C:\Windows\SysWOW64\reg.exe N/A
Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List C:\Windows\SysWOW64\reg.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2089655958-977706906-1981639424-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Jload = "C:\\Users\\Admin\\AppData\\Roaming\\Jload\\Jload.exe" C:\Windows\SysWOW64\reg.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\reg.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\reg.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\reg.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\reg.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\svchost.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\reg.exe N/A

Modifies registry key

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\reg.exe N/A
N/A N/A C:\Windows\SysWOW64\reg.exe N/A
N/A N/A C:\Windows\SysWOW64\reg.exe N/A
N/A N/A C:\Windows\SysWOW64\reg.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: 1 N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeCreateTokenPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeAssignPrimaryTokenPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeLockMemoryPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeMachineAccountPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeTcbPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeCreatePermanentPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeChangeNotifyPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeSyncAgentPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeEnableDelegationPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeImpersonatePrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: 31 N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: 32 N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: 33 N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: 34 N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: 35 N/A C:\Windows\SysWOW64\svchost.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1628 wrote to memory of 700 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe
PID 1628 wrote to memory of 700 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe
PID 1628 wrote to memory of 700 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe
PID 1628 wrote to memory of 700 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe
PID 1628 wrote to memory of 700 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe
PID 1628 wrote to memory of 700 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe
PID 1628 wrote to memory of 700 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe
PID 1628 wrote to memory of 700 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe
PID 700 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Windows\SysWOW64\cmd.exe
PID 700 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Windows\SysWOW64\cmd.exe
PID 700 wrote to memory of 2712 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Windows\SysWOW64\cmd.exe
PID 2712 wrote to memory of 2696 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2712 wrote to memory of 2696 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2712 wrote to memory of 2696 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 700 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 700 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 700 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 2648 wrote to memory of 3308 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 2648 wrote to memory of 3308 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 2648 wrote to memory of 3308 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 2648 wrote to memory of 3308 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 2648 wrote to memory of 3308 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 2648 wrote to memory of 3308 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 2648 wrote to memory of 3308 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 2648 wrote to memory of 3308 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Users\Admin\AppData\Roaming\Jload\Jload.exe
PID 2648 wrote to memory of 3936 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Windows\SysWOW64\svchost.exe
PID 2648 wrote to memory of 3936 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Windows\SysWOW64\svchost.exe
PID 2648 wrote to memory of 3936 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Windows\SysWOW64\svchost.exe
PID 2648 wrote to memory of 3936 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Windows\SysWOW64\svchost.exe
PID 2648 wrote to memory of 3936 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Windows\SysWOW64\svchost.exe
PID 2648 wrote to memory of 3936 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Windows\SysWOW64\svchost.exe
PID 2648 wrote to memory of 3936 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Windows\SysWOW64\svchost.exe
PID 2648 wrote to memory of 3936 N/A C:\Users\Admin\AppData\Roaming\Jload\Jload.exe C:\Windows\SysWOW64\svchost.exe
PID 3936 wrote to memory of 3564 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 3936 wrote to memory of 3564 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 3936 wrote to memory of 3564 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 3936 wrote to memory of 60 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 3936 wrote to memory of 60 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 3936 wrote to memory of 60 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 3936 wrote to memory of 4288 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 3936 wrote to memory of 4288 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 3936 wrote to memory of 4288 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 3936 wrote to memory of 3836 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 3936 wrote to memory of 3836 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 3936 wrote to memory of 3836 N/A C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\cmd.exe
PID 3836 wrote to memory of 536 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3836 wrote to memory of 536 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3836 wrote to memory of 536 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 4288 wrote to memory of 1564 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 4288 wrote to memory of 1564 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 4288 wrote to memory of 1564 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3564 wrote to memory of 4620 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3564 wrote to memory of 4620 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 3564 wrote to memory of 4620 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 60 wrote to memory of 408 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 60 wrote to memory of 408 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 60 wrote to memory of 408 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe

Processes

C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe

"C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe"

C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe

"C:\Users\Admin\AppData\Local\Temp\80def51127668ab91b581c81bc3197d080540323419f8aaf73ae9910a2fd2ce2.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WSGTE.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Jload" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Jload\Jload.exe" /f

C:\Users\Admin\AppData\Roaming\Jload\Jload.exe

"C:\Users\Admin\AppData\Roaming\Jload\Jload.exe"

C:\Users\Admin\AppData\Roaming\Jload\Jload.exe

"C:\Users\Admin\AppData\Roaming\Jload\Jload.exe"

C:\Windows\SysWOW64\svchost.exe

"C:\Windows\system32\svchost.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f

C:\Windows\SysWOW64\cmd.exe

cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\SysWOW64\svchost.exe" /t REG_SZ /d "C:\Windows\SysWOW64\svchost.exe:*:Enabled:Windows Messanger" /f

C:\Windows\SysWOW64\cmd.exe

cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f

C:\Windows\SysWOW64\cmd.exe

cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\RUNE.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\RUNE.exe:*:Enabled:Windows Messanger" /f

C:\Windows\SysWOW64\reg.exe

REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\RUNE.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\RUNE.exe:*:Enabled:Windows Messanger" /f

C:\Windows\SysWOW64\reg.exe

REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f

C:\Windows\SysWOW64\reg.exe

REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f

C:\Windows\SysWOW64\reg.exe

REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\SysWOW64\svchost.exe" /t REG_SZ /d "C:\Windows\SysWOW64\svchost.exe:*:Enabled:Windows Messanger" /f

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 1.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 xdarkx.zapto.org udp
US 8.8.8.8:53 xdarkx.zapto.org udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 166.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 1xdarkx.zapto.org udp
US 8.8.8.8:53 2xdarkx.zapto.org udp
US 8.8.8.8:53 3xdarkx.zapto.org udp
ES 94.73.32.235:3082 3xdarkx.zapto.org tcp
US 8.8.8.8:53 4xdarkx.zapto.org udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 86.49.80.91.in-addr.arpa udp
US 8.8.8.8:53 5xdarkx.zapto.org udp
US 8.8.8.8:53 6xdarkx.zapto.org udp

Files

memory/1628-2-0x0000000002BB0000-0x0000000002BB1000-memory.dmp

memory/1628-3-0x0000000002BF0000-0x0000000002BF1000-memory.dmp

memory/1628-6-0x0000000002CB0000-0x0000000002CB1000-memory.dmp

memory/1628-5-0x0000000002C70000-0x0000000002C71000-memory.dmp

memory/1628-4-0x0000000002C30000-0x0000000002C31000-memory.dmp

memory/700-7-0x0000000000400000-0x000000000040B000-memory.dmp

memory/700-9-0x0000000000400000-0x000000000040B000-memory.dmp

memory/700-11-0x0000000000400000-0x000000000040B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\WSGTE.txt

MD5 bc18986a524cd5015b00135cbf312330
SHA1 65c0fa726aa3b129e2d94a5518186c3cd866f3c0
SHA256 f27d92575749ef19cccc68a524662607f5be5ed2fb415fe7de4f4927f521709c
SHA512 afae8a27a1c64fedd75e9786bbeb4fc8c21795bb2cfd23a749e8de3f102977b391186597d8892cce7be71360b264b22c38a2eaf9507375c1d4e75a5586e8db2e

C:\Users\Admin\AppData\Roaming\Jload\Jload.exe

MD5 687ed61616393f6ba9e2d9f6c5a4347f
SHA1 854ce8722e2fd9429dd43827359adcd1ce7aae81
SHA256 0b8030218bbd3767dff523f4242344d8118e823afd5530fb9ae66b391932210e
SHA512 9e4855f838aad802e172156a7921a00107cd1240de5e168390ac708be577a0d2b141a320f449321bb2ab1208805224182c92a89b3a36bcc1c53742d193010bea

memory/2648-39-0x0000000000400000-0x0000000000497000-memory.dmp

memory/2648-38-0x0000000000400000-0x0000000000497000-memory.dmp

memory/2648-37-0x0000000000400000-0x0000000000497000-memory.dmp

memory/3936-47-0x0000000000400000-0x0000000000478000-memory.dmp

memory/3936-49-0x0000000000400000-0x0000000000478000-memory.dmp

memory/2648-53-0x0000000000400000-0x0000000000497000-memory.dmp

memory/700-58-0x0000000000400000-0x000000000040B000-memory.dmp

memory/3308-59-0x0000000000400000-0x000000000040B000-memory.dmp

memory/3936-61-0x0000000000400000-0x0000000000478000-memory.dmp