Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 20:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_757a1cd1bdd383905d1611d50bae9d25.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_757a1cd1bdd383905d1611d50bae9d25.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_757a1cd1bdd383905d1611d50bae9d25.exe
-
Size
491KB
-
MD5
757a1cd1bdd383905d1611d50bae9d25
-
SHA1
2f64fa1b4b2e3fb58f98987e5a602a9db5924643
-
SHA256
a3b5c4e8e1af28743b94b61970c042cad13bc3cf04630fec1c1e704b7577c4e4
-
SHA512
87bcdb4407687a2c54c6efe4829fb2c695c7024e9e58d10f2f42330408f663db79a9e473e7ce33597499fadbcf8d1ae40cca273985651092a1194b6848a0974e
-
SSDEEP
12288:ruTbw7xgjB23etJGETNxELQpq87zzZ5KjHzaxUdXoS:CTb98utrTnbzzZauqd
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 11 IoCs
resource yara_rule behavioral2/memory/1448-27-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/1448-45-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/1448-47-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/1448-49-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/1448-51-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/1448-54-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/1448-56-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/1448-59-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/1448-61-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/1448-63-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/1448-68-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\1-31E.exe = "C:\\Users\\Admin\\AppData\\Roaming\\1-31E.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Directory\WDocuments.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Directory\\WDocuments.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation JaffaCakes118_757a1cd1bdd383905d1611d50bae9d25.exe -
Executes dropped EXE 3 IoCs
pid Process 3084 WDocuments.exe 1448 WDocuments.exe 2300 WDocuments.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WDocuments = "C:\\Users\\Admin\\AppData\\Roaming\\Directory\\WDocuments.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3084 set thread context of 1448 3084 WDocuments.exe 91 PID 3084 set thread context of 2300 3084 WDocuments.exe 92 -
resource yara_rule behavioral2/memory/1448-27-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1448-25-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1448-22-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1448-45-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1448-47-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1448-49-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1448-51-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1448-54-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1448-56-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1448-59-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1448-61-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1448-63-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1448-68-0x0000000000400000-0x0000000000473000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WDocuments.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WDocuments.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WDocuments.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_757a1cd1bdd383905d1611d50bae9d25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 3676 reg.exe 4924 reg.exe 960 reg.exe 5100 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 1448 WDocuments.exe Token: SeCreateTokenPrivilege 1448 WDocuments.exe Token: SeAssignPrimaryTokenPrivilege 1448 WDocuments.exe Token: SeLockMemoryPrivilege 1448 WDocuments.exe Token: SeIncreaseQuotaPrivilege 1448 WDocuments.exe Token: SeMachineAccountPrivilege 1448 WDocuments.exe Token: SeTcbPrivilege 1448 WDocuments.exe Token: SeSecurityPrivilege 1448 WDocuments.exe Token: SeTakeOwnershipPrivilege 1448 WDocuments.exe Token: SeLoadDriverPrivilege 1448 WDocuments.exe Token: SeSystemProfilePrivilege 1448 WDocuments.exe Token: SeSystemtimePrivilege 1448 WDocuments.exe Token: SeProfSingleProcessPrivilege 1448 WDocuments.exe Token: SeIncBasePriorityPrivilege 1448 WDocuments.exe Token: SeCreatePagefilePrivilege 1448 WDocuments.exe Token: SeCreatePermanentPrivilege 1448 WDocuments.exe Token: SeBackupPrivilege 1448 WDocuments.exe Token: SeRestorePrivilege 1448 WDocuments.exe Token: SeShutdownPrivilege 1448 WDocuments.exe Token: SeDebugPrivilege 1448 WDocuments.exe Token: SeAuditPrivilege 1448 WDocuments.exe Token: SeSystemEnvironmentPrivilege 1448 WDocuments.exe Token: SeChangeNotifyPrivilege 1448 WDocuments.exe Token: SeRemoteShutdownPrivilege 1448 WDocuments.exe Token: SeUndockPrivilege 1448 WDocuments.exe Token: SeSyncAgentPrivilege 1448 WDocuments.exe Token: SeEnableDelegationPrivilege 1448 WDocuments.exe Token: SeManageVolumePrivilege 1448 WDocuments.exe Token: SeImpersonatePrivilege 1448 WDocuments.exe Token: SeCreateGlobalPrivilege 1448 WDocuments.exe Token: 31 1448 WDocuments.exe Token: 32 1448 WDocuments.exe Token: 33 1448 WDocuments.exe Token: 34 1448 WDocuments.exe Token: 35 1448 WDocuments.exe Token: SeDebugPrivilege 2300 WDocuments.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4700 JaffaCakes118_757a1cd1bdd383905d1611d50bae9d25.exe 3084 WDocuments.exe 2300 WDocuments.exe 1448 WDocuments.exe 1448 WDocuments.exe 1448 WDocuments.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4700 wrote to memory of 4668 4700 JaffaCakes118_757a1cd1bdd383905d1611d50bae9d25.exe 86 PID 4700 wrote to memory of 4668 4700 JaffaCakes118_757a1cd1bdd383905d1611d50bae9d25.exe 86 PID 4700 wrote to memory of 4668 4700 JaffaCakes118_757a1cd1bdd383905d1611d50bae9d25.exe 86 PID 4668 wrote to memory of 1968 4668 cmd.exe 89 PID 4668 wrote to memory of 1968 4668 cmd.exe 89 PID 4668 wrote to memory of 1968 4668 cmd.exe 89 PID 4700 wrote to memory of 3084 4700 JaffaCakes118_757a1cd1bdd383905d1611d50bae9d25.exe 90 PID 4700 wrote to memory of 3084 4700 JaffaCakes118_757a1cd1bdd383905d1611d50bae9d25.exe 90 PID 4700 wrote to memory of 3084 4700 JaffaCakes118_757a1cd1bdd383905d1611d50bae9d25.exe 90 PID 3084 wrote to memory of 1448 3084 WDocuments.exe 91 PID 3084 wrote to memory of 1448 3084 WDocuments.exe 91 PID 3084 wrote to memory of 1448 3084 WDocuments.exe 91 PID 3084 wrote to memory of 1448 3084 WDocuments.exe 91 PID 3084 wrote to memory of 1448 3084 WDocuments.exe 91 PID 3084 wrote to memory of 1448 3084 WDocuments.exe 91 PID 3084 wrote to memory of 1448 3084 WDocuments.exe 91 PID 3084 wrote to memory of 1448 3084 WDocuments.exe 91 PID 3084 wrote to memory of 2300 3084 WDocuments.exe 92 PID 3084 wrote to memory of 2300 3084 WDocuments.exe 92 PID 3084 wrote to memory of 2300 3084 WDocuments.exe 92 PID 3084 wrote to memory of 2300 3084 WDocuments.exe 92 PID 3084 wrote to memory of 2300 3084 WDocuments.exe 92 PID 3084 wrote to memory of 2300 3084 WDocuments.exe 92 PID 3084 wrote to memory of 2300 3084 WDocuments.exe 92 PID 1448 wrote to memory of 2312 1448 WDocuments.exe 93 PID 1448 wrote to memory of 2312 1448 WDocuments.exe 93 PID 1448 wrote to memory of 2312 1448 WDocuments.exe 93 PID 1448 wrote to memory of 3436 1448 WDocuments.exe 94 PID 1448 wrote to memory of 3436 1448 WDocuments.exe 94 PID 1448 wrote to memory of 3436 1448 WDocuments.exe 94 PID 1448 wrote to memory of 4444 1448 WDocuments.exe 95 PID 1448 wrote to memory of 4444 1448 WDocuments.exe 95 PID 1448 wrote to memory of 4444 1448 WDocuments.exe 95 PID 1448 wrote to memory of 3116 1448 WDocuments.exe 96 PID 1448 wrote to memory of 3116 1448 WDocuments.exe 96 PID 1448 wrote to memory of 3116 1448 WDocuments.exe 96 PID 4444 wrote to memory of 960 4444 cmd.exe 101 PID 4444 wrote to memory of 960 4444 cmd.exe 101 PID 4444 wrote to memory of 960 4444 cmd.exe 101 PID 3116 wrote to memory of 4924 3116 cmd.exe 102 PID 3116 wrote to memory of 4924 3116 cmd.exe 102 PID 3116 wrote to memory of 4924 3116 cmd.exe 102 PID 3436 wrote to memory of 5100 3436 cmd.exe 103 PID 3436 wrote to memory of 5100 3436 cmd.exe 103 PID 3436 wrote to memory of 5100 3436 cmd.exe 103 PID 2312 wrote to memory of 3676 2312 cmd.exe 104 PID 2312 wrote to memory of 3676 2312 cmd.exe 104 PID 2312 wrote to memory of 3676 2312 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_757a1cd1bdd383905d1611d50bae9d25.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_757a1cd1bdd383905d1611d50bae9d25.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kXdGV.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WDocuments" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Directory\WDocuments.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1968
-
-
-
C:\Users\Admin\AppData\Roaming\Directory\WDocuments.exe"C:\Users\Admin\AppData\Roaming\Directory\WDocuments.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Users\Admin\AppData\Roaming\Directory\WDocuments.exeC:\Users\Admin\AppData\Roaming\Directory\WDocuments.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3676
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Directory\WDocuments.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Directory\WDocuments.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Directory\WDocuments.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Directory\WDocuments.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5100
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:960
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\1-31E.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\1-31E.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\1-31E.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\1-31E.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4924
-
-
-
-
C:\Users\Admin\AppData\Roaming\Directory\WDocuments.exeC:\Users\Admin\AppData\Roaming\Directory\WDocuments.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2300
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD5888ce5284da0c2daa580ca4dad76452a
SHA1a48cce6c874c21d90c58bf9523871abba25942d3
SHA256ab974c7cd56c54a849f19511d4964a572cefbdf8d46e42f48049952ff268fce7
SHA51295ba367a0032e70fa501e9d8e09e984e2ac6fa091796949039dab2b563e90e040a3a00fc636b86234cea66ec33b66792bfb7bc26cc5cd3e3e7684947b842993b
-
Filesize
491KB
MD5757a1cd1bdd383905d1611d50bae9d25
SHA12f64fa1b4b2e3fb58f98987e5a602a9db5924643
SHA256a3b5c4e8e1af28743b94b61970c042cad13bc3cf04630fec1c1e704b7577c4e4
SHA51287bcdb4407687a2c54c6efe4829fb2c695c7024e9e58d10f2f42330408f663db79a9e473e7ce33597499fadbcf8d1ae40cca273985651092a1194b6848a0974e