Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2025, 11:52
Behavioral task
behavioral1
Sample
JaffaCakes118_2d0963088fe8dc09e4f822520f30b910.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2d0963088fe8dc09e4f822520f30b910.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_2d0963088fe8dc09e4f822520f30b910.exe
-
Size
306KB
-
MD5
2d0963088fe8dc09e4f822520f30b910
-
SHA1
02923be0ec0ed112df584abb43b38bbd8613ae46
-
SHA256
ec93bd8ebfad21c74fc9190f4af738e2027ad755b8de52afcb3a4f3470c09db5
-
SHA512
f1204885bc432c1d6a289bf343a2c92f65ff0a2e4ce56718783eb5cd6875938abc728d3539c377157a6dead3f6c313284367376919f81156560e2d9af23df291
-
SSDEEP
6144:FfNdLF0ocp0dyd+97C6H8nnMHPer11XgUfcgxFomgXHsMjoSf:FFdLF9S0deQJ8n7RkgxFZgXxoSf
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 12 IoCs
resource yara_rule behavioral2/memory/640-37-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/640-53-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/640-55-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/640-57-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/640-60-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/640-62-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/640-64-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/640-67-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/640-69-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/640-71-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/640-74-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/640-76-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Windows Updater.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Updater.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Window Updates\\winupdt2.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation JaffaCakes118_2d0963088fe8dc09e4f822520f30b910.exe -
Executes dropped EXE 3 IoCs
pid Process 4424 winupdt2.exe 640 winupdt2.exe 5104 winupdt2.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinUpdt = "C:\\Users\\Admin\\AppData\\Roaming\\Window Updates\\winupdt2.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4424 set thread context of 640 4424 winupdt2.exe 95 PID 4424 set thread context of 5104 4424 winupdt2.exe 96 -
resource yara_rule behavioral2/memory/3760-0-0x0000000000400000-0x00000000005C9000-memory.dmp upx behavioral2/files/0x000300000001e0fd-16.dat upx behavioral2/memory/3760-29-0x0000000000400000-0x00000000005C9000-memory.dmp upx behavioral2/memory/640-32-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/640-35-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/640-37-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/5104-46-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/5104-44-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/5104-41-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/4424-52-0x0000000000400000-0x00000000005C9000-memory.dmp upx behavioral2/memory/640-53-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/5104-54-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral2/memory/640-55-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/640-57-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/640-60-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/640-62-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/640-64-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/640-67-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/640-69-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/640-71-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/640-74-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/640-76-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_2d0963088fe8dc09e4f822520f30b910.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdt2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 544 reg.exe 1416 reg.exe 5072 reg.exe 4752 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 640 winupdt2.exe Token: SeCreateTokenPrivilege 640 winupdt2.exe Token: SeAssignPrimaryTokenPrivilege 640 winupdt2.exe Token: SeLockMemoryPrivilege 640 winupdt2.exe Token: SeIncreaseQuotaPrivilege 640 winupdt2.exe Token: SeMachineAccountPrivilege 640 winupdt2.exe Token: SeTcbPrivilege 640 winupdt2.exe Token: SeSecurityPrivilege 640 winupdt2.exe Token: SeTakeOwnershipPrivilege 640 winupdt2.exe Token: SeLoadDriverPrivilege 640 winupdt2.exe Token: SeSystemProfilePrivilege 640 winupdt2.exe Token: SeSystemtimePrivilege 640 winupdt2.exe Token: SeProfSingleProcessPrivilege 640 winupdt2.exe Token: SeIncBasePriorityPrivilege 640 winupdt2.exe Token: SeCreatePagefilePrivilege 640 winupdt2.exe Token: SeCreatePermanentPrivilege 640 winupdt2.exe Token: SeBackupPrivilege 640 winupdt2.exe Token: SeRestorePrivilege 640 winupdt2.exe Token: SeShutdownPrivilege 640 winupdt2.exe Token: SeDebugPrivilege 640 winupdt2.exe Token: SeAuditPrivilege 640 winupdt2.exe Token: SeSystemEnvironmentPrivilege 640 winupdt2.exe Token: SeChangeNotifyPrivilege 640 winupdt2.exe Token: SeRemoteShutdownPrivilege 640 winupdt2.exe Token: SeUndockPrivilege 640 winupdt2.exe Token: SeSyncAgentPrivilege 640 winupdt2.exe Token: SeEnableDelegationPrivilege 640 winupdt2.exe Token: SeManageVolumePrivilege 640 winupdt2.exe Token: SeImpersonatePrivilege 640 winupdt2.exe Token: SeCreateGlobalPrivilege 640 winupdt2.exe Token: 31 640 winupdt2.exe Token: 32 640 winupdt2.exe Token: 33 640 winupdt2.exe Token: 34 640 winupdt2.exe Token: 35 640 winupdt2.exe Token: SeDebugPrivilege 5104 winupdt2.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3760 JaffaCakes118_2d0963088fe8dc09e4f822520f30b910.exe 4424 winupdt2.exe 640 winupdt2.exe 640 winupdt2.exe 5104 winupdt2.exe 640 winupdt2.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 3760 wrote to memory of 4996 3760 JaffaCakes118_2d0963088fe8dc09e4f822520f30b910.exe 90 PID 3760 wrote to memory of 4996 3760 JaffaCakes118_2d0963088fe8dc09e4f822520f30b910.exe 90 PID 3760 wrote to memory of 4996 3760 JaffaCakes118_2d0963088fe8dc09e4f822520f30b910.exe 90 PID 4996 wrote to memory of 4408 4996 cmd.exe 93 PID 4996 wrote to memory of 4408 4996 cmd.exe 93 PID 4996 wrote to memory of 4408 4996 cmd.exe 93 PID 3760 wrote to memory of 4424 3760 JaffaCakes118_2d0963088fe8dc09e4f822520f30b910.exe 94 PID 3760 wrote to memory of 4424 3760 JaffaCakes118_2d0963088fe8dc09e4f822520f30b910.exe 94 PID 3760 wrote to memory of 4424 3760 JaffaCakes118_2d0963088fe8dc09e4f822520f30b910.exe 94 PID 4424 wrote to memory of 640 4424 winupdt2.exe 95 PID 4424 wrote to memory of 640 4424 winupdt2.exe 95 PID 4424 wrote to memory of 640 4424 winupdt2.exe 95 PID 4424 wrote to memory of 640 4424 winupdt2.exe 95 PID 4424 wrote to memory of 640 4424 winupdt2.exe 95 PID 4424 wrote to memory of 640 4424 winupdt2.exe 95 PID 4424 wrote to memory of 640 4424 winupdt2.exe 95 PID 4424 wrote to memory of 640 4424 winupdt2.exe 95 PID 4424 wrote to memory of 5104 4424 winupdt2.exe 96 PID 4424 wrote to memory of 5104 4424 winupdt2.exe 96 PID 4424 wrote to memory of 5104 4424 winupdt2.exe 96 PID 4424 wrote to memory of 5104 4424 winupdt2.exe 96 PID 4424 wrote to memory of 5104 4424 winupdt2.exe 96 PID 4424 wrote to memory of 5104 4424 winupdt2.exe 96 PID 4424 wrote to memory of 5104 4424 winupdt2.exe 96 PID 4424 wrote to memory of 5104 4424 winupdt2.exe 96 PID 640 wrote to memory of 4876 640 winupdt2.exe 97 PID 640 wrote to memory of 4876 640 winupdt2.exe 97 PID 640 wrote to memory of 4876 640 winupdt2.exe 97 PID 640 wrote to memory of 2324 640 winupdt2.exe 98 PID 640 wrote to memory of 2324 640 winupdt2.exe 98 PID 640 wrote to memory of 2324 640 winupdt2.exe 98 PID 640 wrote to memory of 3220 640 winupdt2.exe 99 PID 640 wrote to memory of 3220 640 winupdt2.exe 99 PID 640 wrote to memory of 3220 640 winupdt2.exe 99 PID 640 wrote to memory of 3608 640 winupdt2.exe 101 PID 640 wrote to memory of 3608 640 winupdt2.exe 101 PID 640 wrote to memory of 3608 640 winupdt2.exe 101 PID 2324 wrote to memory of 544 2324 cmd.exe 105 PID 2324 wrote to memory of 544 2324 cmd.exe 105 PID 2324 wrote to memory of 544 2324 cmd.exe 105 PID 3220 wrote to memory of 1416 3220 cmd.exe 106 PID 3220 wrote to memory of 1416 3220 cmd.exe 106 PID 3220 wrote to memory of 1416 3220 cmd.exe 106 PID 4876 wrote to memory of 5072 4876 cmd.exe 107 PID 4876 wrote to memory of 5072 4876 cmd.exe 107 PID 4876 wrote to memory of 5072 4876 cmd.exe 107 PID 3608 wrote to memory of 4752 3608 cmd.exe 108 PID 3608 wrote to memory of 4752 3608 cmd.exe 108 PID 3608 wrote to memory of 4752 3608 cmd.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2d0963088fe8dc09e4f822520f30b910.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2d0963088fe8dc09e4f822520f30b910.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AxhgD.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WinUpdt" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4408
-
-
-
C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5072
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:544
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1416
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Windows Updater.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Updater.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Windows Updater.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Updater.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4752
-
-
-
-
C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"C:\Users\Admin\AppData\Roaming\Window Updates\winupdt2.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5104
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD549bb161b07149b1bda99901c71d98b1f
SHA1e5e3b389c09d551bd8f3a4cf71ee30e566fdf6e2
SHA256734c4f48449a118dbdfbbe4971ecf112b26b2b45d1889678c01dea98eb5767d8
SHA512da09a2af9b7f9528916ab719ed97ee8b61179bba92016eaed64b3e7d6bf08646801aeeb0eb332bdde175eb64b48106f7cf2fe2bf01ea6128753e4ce1d48707be
-
Filesize
306KB
MD555e114800c087d61786a10fac8d4ca77
SHA10279fb694b7845664216fefc504dd0303a9c0a07
SHA256873362396f6fd51ffa77bd969831b7625ff69b36723972c7c11db0807afa7d72
SHA512969681cfc331ff53b1d2096e745b2d1b4cb338fa9ed89025afd37577ececb02f1b822633e1e9f8c33722bf959f23bc279bc3120761cab265d1363266634baca7