Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2025 10:36
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_aa337c91b3ef28153b1a50628ae1b0d7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_aa337c91b3ef28153b1a50628ae1b0d7.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_aa337c91b3ef28153b1a50628ae1b0d7.exe
-
Size
377KB
-
MD5
aa337c91b3ef28153b1a50628ae1b0d7
-
SHA1
38f48f0cf8661d9a3293b6d95e1a06fc14b484c4
-
SHA256
854bd6eefb37a2003bf58c31e278b0bea6e7b271eeb14ff42d4062ba7b2e7f48
-
SHA512
8f0942422b83bc1da65908a37a6c254cfdeefd7cc019da49226b2df8a5c11794ae00a8bef7eed1db60e9e6faa85da76ae3155fe968f66df3dc9b3c87a077e91f
-
SSDEEP
6144:Tbn851uXpVBuPPGP04dTpp2QvEEEl9lnE9ToGnOjiVE0zoRWpLOWn:Tbn851uXLBuXwPppEVl9C8GnO0zZhl
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 12 IoCs
resource yara_rule behavioral2/memory/8-5-0x0000000000400000-0x000000000045A000-memory.dmp family_blackshades behavioral2/memory/8-9-0x0000000000400000-0x000000000045A000-memory.dmp family_blackshades behavioral2/memory/8-17-0x0000000000400000-0x000000000045A000-memory.dmp family_blackshades behavioral2/memory/8-18-0x0000000000400000-0x000000000045A000-memory.dmp family_blackshades behavioral2/memory/8-20-0x0000000000400000-0x000000000045A000-memory.dmp family_blackshades behavioral2/memory/8-21-0x0000000000400000-0x000000000045A000-memory.dmp family_blackshades behavioral2/memory/8-22-0x0000000000400000-0x000000000045A000-memory.dmp family_blackshades behavioral2/memory/8-24-0x0000000000400000-0x000000000045A000-memory.dmp family_blackshades behavioral2/memory/8-25-0x0000000000400000-0x000000000045A000-memory.dmp family_blackshades behavioral2/memory/8-29-0x0000000000400000-0x000000000045A000-memory.dmp family_blackshades behavioral2/memory/8-30-0x0000000000400000-0x000000000045A000-memory.dmp family_blackshades behavioral2/memory/8-33-0x0000000000400000-0x000000000045A000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\svchost.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Executes dropped EXE 1 IoCs
pid Process 8 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4784 set thread context of 8 4784 JaffaCakes118_aa337c91b3ef28153b1a50628ae1b0d7.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_aa337c91b3ef28153b1a50628ae1b0d7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2952 reg.exe 4944 reg.exe 820 reg.exe 656 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 4784 JaffaCakes118_aa337c91b3ef28153b1a50628ae1b0d7.exe Token: 1 8 svchost.exe Token: SeCreateTokenPrivilege 8 svchost.exe Token: SeAssignPrimaryTokenPrivilege 8 svchost.exe Token: SeLockMemoryPrivilege 8 svchost.exe Token: SeIncreaseQuotaPrivilege 8 svchost.exe Token: SeMachineAccountPrivilege 8 svchost.exe Token: SeTcbPrivilege 8 svchost.exe Token: SeSecurityPrivilege 8 svchost.exe Token: SeTakeOwnershipPrivilege 8 svchost.exe Token: SeLoadDriverPrivilege 8 svchost.exe Token: SeSystemProfilePrivilege 8 svchost.exe Token: SeSystemtimePrivilege 8 svchost.exe Token: SeProfSingleProcessPrivilege 8 svchost.exe Token: SeIncBasePriorityPrivilege 8 svchost.exe Token: SeCreatePagefilePrivilege 8 svchost.exe Token: SeCreatePermanentPrivilege 8 svchost.exe Token: SeBackupPrivilege 8 svchost.exe Token: SeRestorePrivilege 8 svchost.exe Token: SeShutdownPrivilege 8 svchost.exe Token: SeDebugPrivilege 8 svchost.exe Token: SeAuditPrivilege 8 svchost.exe Token: SeSystemEnvironmentPrivilege 8 svchost.exe Token: SeChangeNotifyPrivilege 8 svchost.exe Token: SeRemoteShutdownPrivilege 8 svchost.exe Token: SeUndockPrivilege 8 svchost.exe Token: SeSyncAgentPrivilege 8 svchost.exe Token: SeEnableDelegationPrivilege 8 svchost.exe Token: SeManageVolumePrivilege 8 svchost.exe Token: SeImpersonatePrivilege 8 svchost.exe Token: SeCreateGlobalPrivilege 8 svchost.exe Token: 31 8 svchost.exe Token: 32 8 svchost.exe Token: 33 8 svchost.exe Token: 34 8 svchost.exe Token: 35 8 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 8 svchost.exe 8 svchost.exe 8 svchost.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 4784 wrote to memory of 8 4784 JaffaCakes118_aa337c91b3ef28153b1a50628ae1b0d7.exe 86 PID 4784 wrote to memory of 8 4784 JaffaCakes118_aa337c91b3ef28153b1a50628ae1b0d7.exe 86 PID 4784 wrote to memory of 8 4784 JaffaCakes118_aa337c91b3ef28153b1a50628ae1b0d7.exe 86 PID 4784 wrote to memory of 8 4784 JaffaCakes118_aa337c91b3ef28153b1a50628ae1b0d7.exe 86 PID 4784 wrote to memory of 8 4784 JaffaCakes118_aa337c91b3ef28153b1a50628ae1b0d7.exe 86 PID 4784 wrote to memory of 8 4784 JaffaCakes118_aa337c91b3ef28153b1a50628ae1b0d7.exe 86 PID 4784 wrote to memory of 8 4784 JaffaCakes118_aa337c91b3ef28153b1a50628ae1b0d7.exe 86 PID 4784 wrote to memory of 8 4784 JaffaCakes118_aa337c91b3ef28153b1a50628ae1b0d7.exe 86 PID 8 wrote to memory of 1140 8 svchost.exe 88 PID 8 wrote to memory of 1140 8 svchost.exe 88 PID 8 wrote to memory of 1140 8 svchost.exe 88 PID 8 wrote to memory of 1936 8 svchost.exe 89 PID 8 wrote to memory of 1936 8 svchost.exe 89 PID 8 wrote to memory of 1936 8 svchost.exe 89 PID 8 wrote to memory of 4128 8 svchost.exe 90 PID 8 wrote to memory of 4128 8 svchost.exe 90 PID 8 wrote to memory of 4128 8 svchost.exe 90 PID 8 wrote to memory of 2572 8 svchost.exe 91 PID 8 wrote to memory of 2572 8 svchost.exe 91 PID 8 wrote to memory of 2572 8 svchost.exe 91 PID 4128 wrote to memory of 2952 4128 cmd.exe 96 PID 4128 wrote to memory of 2952 4128 cmd.exe 96 PID 4128 wrote to memory of 2952 4128 cmd.exe 96 PID 1140 wrote to memory of 4944 1140 cmd.exe 97 PID 1140 wrote to memory of 4944 1140 cmd.exe 97 PID 1140 wrote to memory of 4944 1140 cmd.exe 97 PID 1936 wrote to memory of 820 1936 cmd.exe 98 PID 1936 wrote to memory of 820 1936 cmd.exe 98 PID 1936 wrote to memory of 820 1936 cmd.exe 98 PID 2572 wrote to memory of 656 2572 cmd.exe 99 PID 2572 wrote to memory of 656 2572 cmd.exe 99 PID 2572 wrote to memory of 656 2572 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aa337c91b3ef28153b1a50628ae1b0d7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aa337c91b3ef28153b1a50628ae1b0d7.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4944
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\svchost.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\svchost.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:820
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2952
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:656
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5e118330b4629b12368d91b9df6488be0
SHA1ce90218c7e3b90df2a3409ec253048bb6472c2fd
SHA2563a0f2936b8c45e8ba3458d69d7859a63844469e698652e15fb56639d32f40cc9
SHA512ac91c04cb20223dbaaf594440cb778dff36e857921be427c8528ba4c6cdb3e8bf8e71e1ae8af7bde9c04ff5b97b379231625bc1a2b66aba2f98cd340cd8a94b0