Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22/02/2025, 03:54
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe
-
Size
427KB
-
MD5
17198e90194f3fd589021ec6cb49d145
-
SHA1
c4f8406030c9bc3d90fb8356b9433eab29a6eb1b
-
SHA256
2f9d5e6f06708ae86087d78c44998df48fda4be49c92e008aaa64210eb7f8489
-
SHA512
58db0709b32575f2ae157626dc338e064bff69076526329825cf315b9bddb63d5b24cbf9b331c16a504bf0644d3169f4dc94e95e54d17609021d9b0256acf430
-
SSDEEP
12288:KWehNSfG3z3fDrMoxfr2/bOSwRl0UruMZqV5CdVe:KW3fsPEoxYbObRlfrFbe
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 12 IoCs
resource yara_rule behavioral1/memory/2200-5-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2200-4-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2200-12-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2200-13-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2200-15-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2200-16-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2200-17-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2200-18-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2200-20-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2200-21-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2200-24-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2200-27-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\AF9SGE90UDS32.exe = "C:\\Users\\Admin\\AppData\\Roaming\\AF9SGE90UDS32.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2152 set thread context of 2200 2152 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2804 reg.exe 3016 reg.exe 3064 reg.exe 2284 reg.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: 1 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeCreateTokenPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeAssignPrimaryTokenPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeLockMemoryPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeIncreaseQuotaPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeMachineAccountPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeTcbPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeSecurityPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeTakeOwnershipPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeLoadDriverPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeSystemProfilePrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeSystemtimePrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeProfSingleProcessPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeIncBasePriorityPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeCreatePagefilePrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeCreatePermanentPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeBackupPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeRestorePrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeShutdownPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeDebugPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeAuditPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeSystemEnvironmentPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeChangeNotifyPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeRemoteShutdownPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeUndockPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeSyncAgentPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeEnableDelegationPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeManageVolumePrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeImpersonatePrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: SeCreateGlobalPrivilege 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: 31 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: 32 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: 33 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: 34 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe Token: 35 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2200 2152 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 30 PID 2152 wrote to memory of 2200 2152 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 30 PID 2152 wrote to memory of 2200 2152 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 30 PID 2152 wrote to memory of 2200 2152 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 30 PID 2152 wrote to memory of 2200 2152 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 30 PID 2152 wrote to memory of 2200 2152 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 30 PID 2152 wrote to memory of 2200 2152 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 30 PID 2200 wrote to memory of 3020 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 31 PID 2200 wrote to memory of 3020 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 31 PID 2200 wrote to memory of 3020 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 31 PID 2200 wrote to memory of 3020 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 31 PID 2200 wrote to memory of 3036 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 32 PID 2200 wrote to memory of 3036 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 32 PID 2200 wrote to memory of 3036 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 32 PID 2200 wrote to memory of 3036 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 32 PID 2200 wrote to memory of 2140 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 34 PID 2200 wrote to memory of 2140 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 34 PID 2200 wrote to memory of 2140 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 34 PID 2200 wrote to memory of 2140 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 34 PID 2200 wrote to memory of 2916 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 36 PID 2200 wrote to memory of 2916 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 36 PID 2200 wrote to memory of 2916 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 36 PID 2200 wrote to memory of 2916 2200 JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe 36 PID 3036 wrote to memory of 3016 3036 cmd.exe 39 PID 3036 wrote to memory of 3016 3036 cmd.exe 39 PID 3036 wrote to memory of 3016 3036 cmd.exe 39 PID 3036 wrote to memory of 3016 3036 cmd.exe 39 PID 2140 wrote to memory of 2804 2140 cmd.exe 40 PID 2140 wrote to memory of 2804 2140 cmd.exe 40 PID 2140 wrote to memory of 2804 2140 cmd.exe 40 PID 2140 wrote to memory of 2804 2140 cmd.exe 40 PID 2916 wrote to memory of 3064 2916 cmd.exe 41 PID 2916 wrote to memory of 3064 2916 cmd.exe 41 PID 2916 wrote to memory of 3064 2916 cmd.exe 41 PID 2916 wrote to memory of 3064 2916 cmd.exe 41 PID 3020 wrote to memory of 2284 3020 cmd.exe 42 PID 3020 wrote to memory of 2284 3020 cmd.exe 42 PID 3020 wrote to memory of 2284 3020 cmd.exe 42 PID 3020 wrote to memory of 2284 3020 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2284
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_17198e90194f3fd589021ec6cb49d145.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2804
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\AF9SGE90UDS32.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\AF9SGE90UDS32.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\AF9SGE90UDS32.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\AF9SGE90UDS32.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3064
-
-
-