Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2025, 21:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe
-
Size
883KB
-
MD5
0e3fb02e7dfea66abd48e45f5690c87d
-
SHA1
7d3e2c7d2b76055a4e7419680754a5554368df2e
-
SHA256
68bf1663ef3b3c2434e7e015f637d864b8ba3ca53b3eceab69f80a11e60fbbe2
-
SHA512
4f3690b1b36ae8772ce17fbc230235ce5b4d58a6a66d56d1a030f217c6d2d6d367e6e42ea2ef52593c5eeb97f673b418ca2de378a3c5e848dfaf2a4e2d9a151e
-
SSDEEP
24576:4JWgXVxGJ1IC3ovkKWy9+6axHUzDNyrzPrRxmT41a+iSe:89XDGzhmkK05U/NAbrPmU1a+iT
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 5 IoCs
resource yara_rule behavioral2/memory/4432-5-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades behavioral2/memory/4432-12-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades behavioral2/memory/4432-13-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades behavioral2/memory/4432-14-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades behavioral2/memory/4432-18-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5016 set thread context of 4432 5016 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 88 -
resource yara_rule behavioral2/memory/4432-2-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral2/memory/4432-4-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral2/memory/4432-5-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral2/memory/4432-12-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral2/memory/4432-13-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral2/memory/4432-14-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral2/memory/4432-18-0x0000000000400000-0x0000000000474000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 3520 reg.exe 1224 reg.exe 4944 reg.exe 1108 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeCreateTokenPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeAssignPrimaryTokenPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeLockMemoryPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeIncreaseQuotaPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeMachineAccountPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeTcbPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeSecurityPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeTakeOwnershipPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeLoadDriverPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeSystemProfilePrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeSystemtimePrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeProfSingleProcessPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeIncBasePriorityPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeCreatePagefilePrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeCreatePermanentPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeBackupPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeRestorePrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeShutdownPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeDebugPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeAuditPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeSystemEnvironmentPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeChangeNotifyPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeRemoteShutdownPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeUndockPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeSyncAgentPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeEnableDelegationPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeManageVolumePrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeImpersonatePrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeCreateGlobalPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: 31 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: 32 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: 33 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: 34 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: 35 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe Token: SeDebugPrivilege 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 5016 wrote to memory of 4432 5016 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 88 PID 5016 wrote to memory of 4432 5016 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 88 PID 5016 wrote to memory of 4432 5016 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 88 PID 5016 wrote to memory of 4432 5016 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 88 PID 5016 wrote to memory of 4432 5016 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 88 PID 5016 wrote to memory of 4432 5016 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 88 PID 5016 wrote to memory of 4432 5016 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 88 PID 5016 wrote to memory of 4432 5016 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 88 PID 5016 wrote to memory of 4432 5016 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 88 PID 5016 wrote to memory of 4432 5016 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 88 PID 4432 wrote to memory of 992 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 89 PID 4432 wrote to memory of 992 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 89 PID 4432 wrote to memory of 992 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 89 PID 4432 wrote to memory of 2328 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 90 PID 4432 wrote to memory of 2328 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 90 PID 4432 wrote to memory of 2328 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 90 PID 4432 wrote to memory of 4300 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 91 PID 4432 wrote to memory of 4300 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 91 PID 4432 wrote to memory of 4300 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 91 PID 4432 wrote to memory of 4116 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 92 PID 4432 wrote to memory of 4116 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 92 PID 4432 wrote to memory of 4116 4432 JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe 92 PID 992 wrote to memory of 1108 992 cmd.exe 97 PID 992 wrote to memory of 1108 992 cmd.exe 97 PID 992 wrote to memory of 1108 992 cmd.exe 97 PID 4300 wrote to memory of 3520 4300 cmd.exe 98 PID 4300 wrote to memory of 3520 4300 cmd.exe 98 PID 4300 wrote to memory of 3520 4300 cmd.exe 98 PID 2328 wrote to memory of 1224 2328 cmd.exe 99 PID 2328 wrote to memory of 1224 2328 cmd.exe 99 PID 2328 wrote to memory of 1224 2328 cmd.exe 99 PID 4116 wrote to memory of 4944 4116 cmd.exe 100 PID 4116 wrote to memory of 4944 4116 cmd.exe 100 PID 4116 wrote to memory of 4944 4116 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe"1⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1108
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0e3fb02e7dfea66abd48e45f5690c87d.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1224
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3520
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4944
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33B
MD5085d4290586c023db8b57f10bb82a826
SHA1b625dee6416beb09a11858e6fb9f2bf4cd56d156
SHA256f306b6b203f502e110295ebaa05ae3f76a0735b35777d79568d6ff4d1d70f02e
SHA5128a58fc91989d8227e0d4ff965cd087e8ba0de16b52789ba39f29bce6c0434026050a8468b7526bd64cb9b3c4710eb3a709f594c2ca98ef39050ac183ff60d94f