Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2025, 02:57
Behavioral task
behavioral1
Sample
JaffaCakes118_8f34a29b9080309ad1f8971108040ab9.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8f34a29b9080309ad1f8971108040ab9.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_8f34a29b9080309ad1f8971108040ab9.exe
-
Size
456KB
-
MD5
8f34a29b9080309ad1f8971108040ab9
-
SHA1
35224f2f1140836122f4e3eff9cdbec7e8127d05
-
SHA256
c3bff9a3370b7c6ab0ed9aee5df43728d3ce9308a642ecb9bd2be5c9d312aa9c
-
SHA512
4dc4198dad154e14fb8eaf81e58d6316d8312ae87b9043c9bd7d524926cf2ec40d7fb81d3ae426ff46b581d10dfffd4237ca378708b3145eea21350baf86e453
-
SSDEEP
12288:qqy6m/BCfGKEQA0cUH2VMCAlMl8Ynnnul7u5GDh9OLJDyiLBHnnnHpEJNOfEDhNF:C6m/BCfGKEQA0cUH2VMCAlrYnnnul7uG
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 15 IoCs
resource yara_rule behavioral2/memory/892-6-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/892-11-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/892-18-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/892-19-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/892-21-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/892-22-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/892-23-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/892-25-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/892-26-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/892-27-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/892-29-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/892-30-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/892-31-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/892-32-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/892-35-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\WinDefender.exe = "C:\\Users\\Admin\\AppData\\Roaming\\WinDefender.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\a1ntjxp1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a1ntjxp1.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Executes dropped EXE 1 IoCs
pid Process 892 a1ntjxp1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4856 set thread context of 892 4856 JaffaCakes118_8f34a29b9080309ad1f8971108040ab9.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8f34a29b9080309ad1f8971108040ab9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1ntjxp1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2984 reg.exe 4984 reg.exe 4716 reg.exe 3244 reg.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: 1 892 a1ntjxp1.exe Token: SeCreateTokenPrivilege 892 a1ntjxp1.exe Token: SeAssignPrimaryTokenPrivilege 892 a1ntjxp1.exe Token: SeLockMemoryPrivilege 892 a1ntjxp1.exe Token: SeIncreaseQuotaPrivilege 892 a1ntjxp1.exe Token: SeMachineAccountPrivilege 892 a1ntjxp1.exe Token: SeTcbPrivilege 892 a1ntjxp1.exe Token: SeSecurityPrivilege 892 a1ntjxp1.exe Token: SeTakeOwnershipPrivilege 892 a1ntjxp1.exe Token: SeLoadDriverPrivilege 892 a1ntjxp1.exe Token: SeSystemProfilePrivilege 892 a1ntjxp1.exe Token: SeSystemtimePrivilege 892 a1ntjxp1.exe Token: SeProfSingleProcessPrivilege 892 a1ntjxp1.exe Token: SeIncBasePriorityPrivilege 892 a1ntjxp1.exe Token: SeCreatePagefilePrivilege 892 a1ntjxp1.exe Token: SeCreatePermanentPrivilege 892 a1ntjxp1.exe Token: SeBackupPrivilege 892 a1ntjxp1.exe Token: SeRestorePrivilege 892 a1ntjxp1.exe Token: SeShutdownPrivilege 892 a1ntjxp1.exe Token: SeDebugPrivilege 892 a1ntjxp1.exe Token: SeAuditPrivilege 892 a1ntjxp1.exe Token: SeSystemEnvironmentPrivilege 892 a1ntjxp1.exe Token: SeChangeNotifyPrivilege 892 a1ntjxp1.exe Token: SeRemoteShutdownPrivilege 892 a1ntjxp1.exe Token: SeUndockPrivilege 892 a1ntjxp1.exe Token: SeSyncAgentPrivilege 892 a1ntjxp1.exe Token: SeEnableDelegationPrivilege 892 a1ntjxp1.exe Token: SeManageVolumePrivilege 892 a1ntjxp1.exe Token: SeImpersonatePrivilege 892 a1ntjxp1.exe Token: SeCreateGlobalPrivilege 892 a1ntjxp1.exe Token: 31 892 a1ntjxp1.exe Token: 32 892 a1ntjxp1.exe Token: 33 892 a1ntjxp1.exe Token: 34 892 a1ntjxp1.exe Token: 35 892 a1ntjxp1.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 892 a1ntjxp1.exe 892 a1ntjxp1.exe 892 a1ntjxp1.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 4856 wrote to memory of 892 4856 JaffaCakes118_8f34a29b9080309ad1f8971108040ab9.exe 89 PID 4856 wrote to memory of 892 4856 JaffaCakes118_8f34a29b9080309ad1f8971108040ab9.exe 89 PID 4856 wrote to memory of 892 4856 JaffaCakes118_8f34a29b9080309ad1f8971108040ab9.exe 89 PID 4856 wrote to memory of 892 4856 JaffaCakes118_8f34a29b9080309ad1f8971108040ab9.exe 89 PID 4856 wrote to memory of 892 4856 JaffaCakes118_8f34a29b9080309ad1f8971108040ab9.exe 89 PID 4856 wrote to memory of 892 4856 JaffaCakes118_8f34a29b9080309ad1f8971108040ab9.exe 89 PID 4856 wrote to memory of 892 4856 JaffaCakes118_8f34a29b9080309ad1f8971108040ab9.exe 89 PID 4856 wrote to memory of 892 4856 JaffaCakes118_8f34a29b9080309ad1f8971108040ab9.exe 89 PID 892 wrote to memory of 5108 892 a1ntjxp1.exe 90 PID 892 wrote to memory of 5108 892 a1ntjxp1.exe 90 PID 892 wrote to memory of 5108 892 a1ntjxp1.exe 90 PID 892 wrote to memory of 2528 892 a1ntjxp1.exe 91 PID 892 wrote to memory of 2528 892 a1ntjxp1.exe 91 PID 892 wrote to memory of 2528 892 a1ntjxp1.exe 91 PID 892 wrote to memory of 4056 892 a1ntjxp1.exe 92 PID 892 wrote to memory of 4056 892 a1ntjxp1.exe 92 PID 892 wrote to memory of 4056 892 a1ntjxp1.exe 92 PID 892 wrote to memory of 2980 892 a1ntjxp1.exe 93 PID 892 wrote to memory of 2980 892 a1ntjxp1.exe 93 PID 892 wrote to memory of 2980 892 a1ntjxp1.exe 93 PID 2528 wrote to memory of 2984 2528 cmd.exe 98 PID 2528 wrote to memory of 2984 2528 cmd.exe 98 PID 2528 wrote to memory of 2984 2528 cmd.exe 98 PID 2980 wrote to memory of 4716 2980 cmd.exe 99 PID 2980 wrote to memory of 4716 2980 cmd.exe 99 PID 2980 wrote to memory of 4716 2980 cmd.exe 99 PID 4056 wrote to memory of 4984 4056 cmd.exe 100 PID 4056 wrote to memory of 4984 4056 cmd.exe 100 PID 4056 wrote to memory of 4984 4056 cmd.exe 100 PID 5108 wrote to memory of 3244 5108 cmd.exe 101 PID 5108 wrote to memory of 3244 5108 cmd.exe 101 PID 5108 wrote to memory of 3244 5108 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8f34a29b9080309ad1f8971108040ab9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8f34a29b9080309ad1f8971108040ab9.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\a1ntjxp1.exeC:\Users\Admin\AppData\Local\Temp\a1ntjxp1.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3244
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\a1ntjxp1.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\a1ntjxp1.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\a1ntjxp1.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\a1ntjxp1.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2984
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4984
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\WinDefender.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WinDefender.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\WinDefender.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WinDefender.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4716
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34