Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2025, 10:19 UTC

General

  • Target

    JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe

  • Size

    336KB

  • MD5

    8768928e57f790a22c201ec745c949b4

  • SHA1

    ec2392f44b5110122565e82b0f02d0b631a2dcaa

  • SHA256

    852680e7ce277ce20e513df5af85fbe0534b2735cf2243de4c9851264b8cc864

  • SHA512

    c9ab1f6524018cb402788279d0469898a0e218587254074a124251093dbbeb90858d39575ff1ccb8571ecefdc6f6c8e54f459ca3fbf3794f560df7437fcbeb49

  • SSDEEP

    6144:xG78LjzOANvSAsQLqF9pXMiY3sGB6UduRfLtcH:47kmAN6omFMb3sGB6UduRfLaH

Malware Config

Signatures

  • Blackshades

    Blackshades is a remote access trojan with various capabilities.

  • Blackshades family
  • Blackshades payload 8 IoCs
  • Modifies firewall policy service 3 TTPs 10 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:316
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:784
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Modifies firewall policy service
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:432
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe:*:Enabled:Windows Messanger" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:456
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Modifies firewall policy service
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:1900
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1876
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • Modifies firewall policy service
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:1444
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\server.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\server.exe:*:Enabled:Windows Messanger" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4424
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\server.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\server.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • Modifies firewall policy service
        • System Location Discovery: System Language Discovery
        • Modifies registry key
        PID:772

Network

  • flag-us
    DNS
    serverhack.no-ip.biz
    JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe
    Remote address:
    8.8.8.8:53
    Request
    serverhack.no-ip.biz
    IN A
    Response
  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    228.249.119.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    228.249.119.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    20.160.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    20.160.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    7.98.51.23.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    7.98.51.23.in-addr.arpa
    IN PTR
    Response
    7.98.51.23.in-addr.arpa
    IN PTR
    a23-51-98-7deploystaticakamaitechnologiescom
  • flag-us
    DNS
    13.86.106.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    13.86.106.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    serverhack.no-ip.biz
    JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe
    Remote address:
    8.8.8.8:53
    Request
    serverhack.no-ip.biz
    IN A
    Response
  • flag-us
    DNS
    serverhack.no-ip.biz
    JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe
    Remote address:
    8.8.8.8:53
    Request
    serverhack.no-ip.biz
    IN A
    Response
  • flag-us
    DNS
    212.20.149.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    212.20.149.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    171.39.242.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    171.39.242.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    serverhack.no-ip.biz
    JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe
    Remote address:
    8.8.8.8:53
    Request
    serverhack.no-ip.biz
    IN A
    Response
  • flag-us
    DNS
    serverhack.no-ip.biz
    JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe
    Remote address:
    8.8.8.8:53
    Request
    serverhack.no-ip.biz
    IN A
    Response
  • flag-us
    DNS
    172.214.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.214.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    serverhack.no-ip.biz
    JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe
    Remote address:
    8.8.8.8:53
    Request
    serverhack.no-ip.biz
    IN A
    Response
  • flag-us
    DNS
    serverhack.no-ip.biz
    JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe
    Remote address:
    8.8.8.8:53
    Request
    serverhack.no-ip.biz
    IN A
    Response
  • flag-us
    DNS
    31.243.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    31.243.111.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    serverhack.no-ip.biz
    JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe
    Remote address:
    8.8.8.8:53
    Request
    serverhack.no-ip.biz
    IN A
    Response
  • flag-us
    DNS
    serverhack.no-ip.biz
    JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe
    Remote address:
    8.8.8.8:53
    Request
    serverhack.no-ip.biz
    IN A
    Response
  • flag-us
    DNS
    serverhack.no-ip.biz
    JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe
    Remote address:
    8.8.8.8:53
    Request
    serverhack.no-ip.biz
    IN A
    Response
No results found
  • 8.8.8.8:53
    serverhack.no-ip.biz
    dns
    JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe
    66 B
    126 B
    1
    1

    DNS Request

    serverhack.no-ip.biz

  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    228.249.119.40.in-addr.arpa
    dns
    73 B
    159 B
    1
    1

    DNS Request

    228.249.119.40.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    20.160.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    20.160.190.20.in-addr.arpa

  • 8.8.8.8:53
    7.98.51.23.in-addr.arpa
    dns
    69 B
    131 B
    1
    1

    DNS Request

    7.98.51.23.in-addr.arpa

  • 8.8.8.8:53
    13.86.106.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    13.86.106.20.in-addr.arpa

  • 8.8.8.8:53
    serverhack.no-ip.biz
    dns
    JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe
    66 B
    126 B
    1
    1

    DNS Request

    serverhack.no-ip.biz

  • 8.8.8.8:53
    serverhack.no-ip.biz
    dns
    JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe
    66 B
    126 B
    1
    1

    DNS Request

    serverhack.no-ip.biz

  • 8.8.8.8:53
    212.20.149.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    212.20.149.52.in-addr.arpa

  • 8.8.8.8:53
    171.39.242.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    171.39.242.20.in-addr.arpa

  • 8.8.8.8:53
    serverhack.no-ip.biz
    dns
    JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe
    66 B
    126 B
    1
    1

    DNS Request

    serverhack.no-ip.biz

  • 8.8.8.8:53
    serverhack.no-ip.biz
    dns
    JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe
    66 B
    126 B
    1
    1

    DNS Request

    serverhack.no-ip.biz

  • 8.8.8.8:53
    172.214.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.214.232.199.in-addr.arpa

  • 8.8.8.8:53
    serverhack.no-ip.biz
    dns
    JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe
    66 B
    126 B
    1
    1

    DNS Request

    serverhack.no-ip.biz

  • 8.8.8.8:53
    serverhack.no-ip.biz
    dns
    JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe
    66 B
    126 B
    1
    1

    DNS Request

    serverhack.no-ip.biz

  • 8.8.8.8:53
    31.243.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    31.243.111.52.in-addr.arpa

  • 8.8.8.8:53
    serverhack.no-ip.biz
    dns
    JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe
    66 B
    126 B
    1
    1

    DNS Request

    serverhack.no-ip.biz

  • 8.8.8.8:53
    serverhack.no-ip.biz
    dns
    JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe
    66 B
    126 B
    1
    1

    DNS Request

    serverhack.no-ip.biz

  • 8.8.8.8:53
    serverhack.no-ip.biz
    dns
    JaffaCakes118_8768928e57f790a22c201ec745c949b4.exe
    66 B
    126 B
    1
    1

    DNS Request

    serverhack.no-ip.biz

  • 8.8.8.8:53

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/316-3-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/316-4-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/316-5-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/316-7-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/316-8-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/316-10-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/316-11-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/316-12-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.