Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2025 15:33
Behavioral task
behavioral1
Sample
JaffaCakes118_a11649fafcbcfdbaca87e3bbf89daf09.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a11649fafcbcfdbaca87e3bbf89daf09.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_a11649fafcbcfdbaca87e3bbf89daf09.exe
-
Size
360KB
-
MD5
a11649fafcbcfdbaca87e3bbf89daf09
-
SHA1
98f86fe89e61f509b5822ee0826bf0045cad489b
-
SHA256
0dcc49eda604c6174d67132ea2622f0837f6c1082ed56ba092bcde6c44bc8671
-
SHA512
225c4485980b1b9bc9186573b990e1a641d16988b73ed94bdddab737663b02f001cfcd4c5913aec16d77e5b1c4609d09c96a3591d11b43822e6206dbe40f1a2f
-
SSDEEP
6144:0JETwTCqVgks9V0iuYVzcUvh6J+JrAkUPNFxMmfrijjzl/moS:0JEH+/ssi1cUvh6J+Srj7WjjzUoS
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 9 IoCs
resource yara_rule behavioral2/memory/2908-28-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/2908-42-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/2908-43-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/2908-45-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/2908-48-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/2908-50-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/2908-52-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/2908-54-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/2908-59-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Stella.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Stella.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Imageviewer.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Imageviewer.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\Control Panel\International\Geo\Nation JaffaCakes118_a11649fafcbcfdbaca87e3bbf89daf09.exe -
Executes dropped EXE 3 IoCs
pid Process 3832 Imageviewer.exe 2908 Imageviewer.exe 3384 Imageviewer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4003209913-3868522715-854928974-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Imageviewer = "C:\\Users\\Admin\\AppData\\Roaming\\Imageviewer.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3832 set thread context of 2908 3832 Imageviewer.exe 93 PID 3832 set thread context of 3384 3832 Imageviewer.exe 106 -
resource yara_rule behavioral2/memory/4308-0-0x0000000000400000-0x0000000000779000-memory.dmp upx behavioral2/files/0x000a00000001da20-11.dat upx behavioral2/memory/3832-18-0x0000000000400000-0x0000000000779000-memory.dmp upx behavioral2/memory/4308-20-0x0000000000400000-0x0000000000779000-memory.dmp upx behavioral2/memory/2908-26-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/2908-28-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/2908-23-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/3384-34-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/3832-39-0x0000000000400000-0x0000000000779000-memory.dmp upx behavioral2/memory/3384-38-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/3384-36-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/2908-42-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/2908-43-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/3384-44-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/2908-45-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/2908-48-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/2908-50-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/2908-52-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/2908-54-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/2908-59-0x0000000000400000-0x0000000000473000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Imageviewer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Imageviewer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a11649fafcbcfdbaca87e3bbf89daf09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Imageviewer.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 1956 reg.exe 2104 reg.exe 3432 reg.exe 3988 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 2908 Imageviewer.exe Token: SeCreateTokenPrivilege 2908 Imageviewer.exe Token: SeAssignPrimaryTokenPrivilege 2908 Imageviewer.exe Token: SeLockMemoryPrivilege 2908 Imageviewer.exe Token: SeIncreaseQuotaPrivilege 2908 Imageviewer.exe Token: SeMachineAccountPrivilege 2908 Imageviewer.exe Token: SeTcbPrivilege 2908 Imageviewer.exe Token: SeSecurityPrivilege 2908 Imageviewer.exe Token: SeTakeOwnershipPrivilege 2908 Imageviewer.exe Token: SeLoadDriverPrivilege 2908 Imageviewer.exe Token: SeSystemProfilePrivilege 2908 Imageviewer.exe Token: SeSystemtimePrivilege 2908 Imageviewer.exe Token: SeProfSingleProcessPrivilege 2908 Imageviewer.exe Token: SeIncBasePriorityPrivilege 2908 Imageviewer.exe Token: SeCreatePagefilePrivilege 2908 Imageviewer.exe Token: SeCreatePermanentPrivilege 2908 Imageviewer.exe Token: SeBackupPrivilege 2908 Imageviewer.exe Token: SeRestorePrivilege 2908 Imageviewer.exe Token: SeShutdownPrivilege 2908 Imageviewer.exe Token: SeDebugPrivilege 2908 Imageviewer.exe Token: SeAuditPrivilege 2908 Imageviewer.exe Token: SeSystemEnvironmentPrivilege 2908 Imageviewer.exe Token: SeChangeNotifyPrivilege 2908 Imageviewer.exe Token: SeRemoteShutdownPrivilege 2908 Imageviewer.exe Token: SeUndockPrivilege 2908 Imageviewer.exe Token: SeSyncAgentPrivilege 2908 Imageviewer.exe Token: SeEnableDelegationPrivilege 2908 Imageviewer.exe Token: SeManageVolumePrivilege 2908 Imageviewer.exe Token: SeImpersonatePrivilege 2908 Imageviewer.exe Token: SeCreateGlobalPrivilege 2908 Imageviewer.exe Token: 31 2908 Imageviewer.exe Token: 32 2908 Imageviewer.exe Token: 33 2908 Imageviewer.exe Token: 34 2908 Imageviewer.exe Token: 35 2908 Imageviewer.exe Token: SeDebugPrivilege 3384 Imageviewer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4308 JaffaCakes118_a11649fafcbcfdbaca87e3bbf89daf09.exe 3832 Imageviewer.exe 2908 Imageviewer.exe 2908 Imageviewer.exe 2908 Imageviewer.exe 3384 Imageviewer.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 4308 wrote to memory of 1732 4308 JaffaCakes118_a11649fafcbcfdbaca87e3bbf89daf09.exe 87 PID 4308 wrote to memory of 1732 4308 JaffaCakes118_a11649fafcbcfdbaca87e3bbf89daf09.exe 87 PID 4308 wrote to memory of 1732 4308 JaffaCakes118_a11649fafcbcfdbaca87e3bbf89daf09.exe 87 PID 1732 wrote to memory of 2856 1732 cmd.exe 90 PID 1732 wrote to memory of 2856 1732 cmd.exe 90 PID 1732 wrote to memory of 2856 1732 cmd.exe 90 PID 4308 wrote to memory of 3832 4308 JaffaCakes118_a11649fafcbcfdbaca87e3bbf89daf09.exe 92 PID 4308 wrote to memory of 3832 4308 JaffaCakes118_a11649fafcbcfdbaca87e3bbf89daf09.exe 92 PID 4308 wrote to memory of 3832 4308 JaffaCakes118_a11649fafcbcfdbaca87e3bbf89daf09.exe 92 PID 3832 wrote to memory of 2908 3832 Imageviewer.exe 93 PID 3832 wrote to memory of 2908 3832 Imageviewer.exe 93 PID 3832 wrote to memory of 2908 3832 Imageviewer.exe 93 PID 3832 wrote to memory of 2908 3832 Imageviewer.exe 93 PID 3832 wrote to memory of 2908 3832 Imageviewer.exe 93 PID 3832 wrote to memory of 2908 3832 Imageviewer.exe 93 PID 3832 wrote to memory of 2908 3832 Imageviewer.exe 93 PID 3832 wrote to memory of 2908 3832 Imageviewer.exe 93 PID 2908 wrote to memory of 4100 2908 Imageviewer.exe 94 PID 2908 wrote to memory of 4100 2908 Imageviewer.exe 94 PID 2908 wrote to memory of 4100 2908 Imageviewer.exe 94 PID 2908 wrote to memory of 1384 2908 Imageviewer.exe 95 PID 2908 wrote to memory of 1384 2908 Imageviewer.exe 95 PID 2908 wrote to memory of 1384 2908 Imageviewer.exe 95 PID 2908 wrote to memory of 3776 2908 Imageviewer.exe 96 PID 2908 wrote to memory of 3776 2908 Imageviewer.exe 96 PID 2908 wrote to memory of 3776 2908 Imageviewer.exe 96 PID 2908 wrote to memory of 1276 2908 Imageviewer.exe 97 PID 2908 wrote to memory of 1276 2908 Imageviewer.exe 97 PID 2908 wrote to memory of 1276 2908 Imageviewer.exe 97 PID 1384 wrote to memory of 1956 1384 cmd.exe 102 PID 1384 wrote to memory of 1956 1384 cmd.exe 102 PID 1384 wrote to memory of 1956 1384 cmd.exe 102 PID 4100 wrote to memory of 2104 4100 cmd.exe 104 PID 4100 wrote to memory of 2104 4100 cmd.exe 104 PID 4100 wrote to memory of 2104 4100 cmd.exe 104 PID 3776 wrote to memory of 3432 3776 cmd.exe 103 PID 3776 wrote to memory of 3432 3776 cmd.exe 103 PID 3776 wrote to memory of 3432 3776 cmd.exe 103 PID 1276 wrote to memory of 3988 1276 cmd.exe 105 PID 1276 wrote to memory of 3988 1276 cmd.exe 105 PID 1276 wrote to memory of 3988 1276 cmd.exe 105 PID 3832 wrote to memory of 3384 3832 Imageviewer.exe 106 PID 3832 wrote to memory of 3384 3832 Imageviewer.exe 106 PID 3832 wrote to memory of 3384 3832 Imageviewer.exe 106 PID 3832 wrote to memory of 3384 3832 Imageviewer.exe 106 PID 3832 wrote to memory of 3384 3832 Imageviewer.exe 106 PID 3832 wrote to memory of 3384 3832 Imageviewer.exe 106 PID 3832 wrote to memory of 3384 3832 Imageviewer.exe 106 PID 3832 wrote to memory of 3384 3832 Imageviewer.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a11649fafcbcfdbaca87e3bbf89daf09.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a11649fafcbcfdbaca87e3bbf89daf09.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yDXKn.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Imageviewer" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Imageviewer.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
C:\Users\Admin\AppData\Roaming\Imageviewer.exe"C:\Users\Admin\AppData\Roaming\Imageviewer.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Roaming\Imageviewer.exeC:\Users\Admin\AppData\Roaming\Imageviewer.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2104
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Imageviewer.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Imageviewer.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Imageviewer.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Imageviewer.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1956
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3432
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Stella.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Stella.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Stella.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Stella.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3988
-
-
-
-
C:\Users\Admin\AppData\Roaming\Imageviewer.exeC:\Users\Admin\AppData\Roaming\Imageviewer.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3384
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142B
MD53ab5f77150ecf233a8e9eba23574f042
SHA1400dc9e263be9a22cbacd38f73050cb82d6e7f31
SHA256a200dd6306aaf3a863d838bbd5722201cde5c47110a9188c9c00056605105d71
SHA5129918936692f2d62f593bbccea3bf8fa257a002aec7f66497bd2d166aff64ccf2c331d3e2dd8a49c50b621699552951a9e742977224d8863465e32a5911fae9b2
-
Filesize
360KB
MD5a11649fafcbcfdbaca87e3bbf89daf09
SHA198f86fe89e61f509b5822ee0826bf0045cad489b
SHA2560dcc49eda604c6174d67132ea2622f0837f6c1082ed56ba092bcde6c44bc8671
SHA512225c4485980b1b9bc9186573b990e1a641d16988b73ed94bdddab737663b02f001cfcd4c5913aec16d77e5b1c4609d09c96a3591d11b43822e6206dbe40f1a2f