Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe
-
Size
517KB
-
MD5
3671211d6cbd5f470e4cc32d03a7b730
-
SHA1
54ef4c7cfdb75597f93fd0d9e46e4daef597eb95
-
SHA256
8b4ba0001ecedff27c9ce77a5fea7252caaf2b511c78e64afc62f79f010c79c7
-
SHA512
86c4c57501c0bf41ebb09703e46c6e0ca63af7503088a57f9e1d3d62bc0350bc9ba6ded6e50368d0d1c547ce3c2bae49d50e795430db873d35baa707fa21e7ed
-
SSDEEP
12288:cx/hxpKAjH9ImwKNbHDf42j4Mb1TuilTS1rhqdcn4No:cxIG5/TDf42jTZ3v
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 2 IoCs
resource yara_rule behavioral1/memory/2840-13-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2840-9-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe = "C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\AppLaunch.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\Mar16ABirds.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Mar16ABirds.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 3068 ScCore.exe 2884 IEShims.exe -
Loads dropped DLL 3 IoCs
pid Process 2136 JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe 2136 JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe 3068 ScCore.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2136 set thread context of 2840 2136 JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe 31 PID 2884 set thread context of 2456 2884 IEShims.exe 46 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ScCore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEShims.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 396 reg.exe 2484 reg.exe 2068 reg.exe 836 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2136 JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe 3068 ScCore.exe 2884 IEShims.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 2136 JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe 2884 IEShims.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 3068 ScCore.exe 2136 JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeDebugPrivilege 2136 JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe Token: 1 2840 AppLaunch.exe Token: SeCreateTokenPrivilege 2840 AppLaunch.exe Token: SeAssignPrimaryTokenPrivilege 2840 AppLaunch.exe Token: SeLockMemoryPrivilege 2840 AppLaunch.exe Token: SeIncreaseQuotaPrivilege 2840 AppLaunch.exe Token: SeMachineAccountPrivilege 2840 AppLaunch.exe Token: SeTcbPrivilege 2840 AppLaunch.exe Token: SeSecurityPrivilege 2840 AppLaunch.exe Token: SeTakeOwnershipPrivilege 2840 AppLaunch.exe Token: SeLoadDriverPrivilege 2840 AppLaunch.exe Token: SeSystemProfilePrivilege 2840 AppLaunch.exe Token: SeSystemtimePrivilege 2840 AppLaunch.exe Token: SeProfSingleProcessPrivilege 2840 AppLaunch.exe Token: SeIncBasePriorityPrivilege 2840 AppLaunch.exe Token: SeCreatePagefilePrivilege 2840 AppLaunch.exe Token: SeCreatePermanentPrivilege 2840 AppLaunch.exe Token: SeBackupPrivilege 2840 AppLaunch.exe Token: SeRestorePrivilege 2840 AppLaunch.exe Token: SeShutdownPrivilege 2840 AppLaunch.exe Token: SeDebugPrivilege 2840 AppLaunch.exe Token: SeAuditPrivilege 2840 AppLaunch.exe Token: SeSystemEnvironmentPrivilege 2840 AppLaunch.exe Token: SeChangeNotifyPrivilege 2840 AppLaunch.exe Token: SeRemoteShutdownPrivilege 2840 AppLaunch.exe Token: SeUndockPrivilege 2840 AppLaunch.exe Token: SeSyncAgentPrivilege 2840 AppLaunch.exe Token: SeEnableDelegationPrivilege 2840 AppLaunch.exe Token: SeManageVolumePrivilege 2840 AppLaunch.exe Token: SeImpersonatePrivilege 2840 AppLaunch.exe Token: SeCreateGlobalPrivilege 2840 AppLaunch.exe Token: 31 2840 AppLaunch.exe Token: 32 2840 AppLaunch.exe Token: 33 2840 AppLaunch.exe Token: 34 2840 AppLaunch.exe Token: 35 2840 AppLaunch.exe Token: SeDebugPrivilege 3068 ScCore.exe Token: SeDebugPrivilege 2884 IEShims.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2840 AppLaunch.exe 2840 AppLaunch.exe 2840 AppLaunch.exe 2456 AppLaunch.exe 2456 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2840 2136 JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe 31 PID 2136 wrote to memory of 2840 2136 JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe 31 PID 2136 wrote to memory of 2840 2136 JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe 31 PID 2136 wrote to memory of 2840 2136 JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe 31 PID 2136 wrote to memory of 2840 2136 JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe 31 PID 2136 wrote to memory of 2840 2136 JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe 31 PID 2136 wrote to memory of 2840 2136 JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe 31 PID 2136 wrote to memory of 2840 2136 JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe 31 PID 2136 wrote to memory of 2840 2136 JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe 31 PID 2136 wrote to memory of 2840 2136 JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe 31 PID 2136 wrote to memory of 2840 2136 JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe 31 PID 2136 wrote to memory of 3068 2136 JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe 32 PID 2136 wrote to memory of 3068 2136 JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe 32 PID 2136 wrote to memory of 3068 2136 JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe 32 PID 2136 wrote to memory of 3068 2136 JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe 32 PID 2840 wrote to memory of 2992 2840 AppLaunch.exe 33 PID 2840 wrote to memory of 2992 2840 AppLaunch.exe 33 PID 2840 wrote to memory of 2992 2840 AppLaunch.exe 33 PID 2840 wrote to memory of 2992 2840 AppLaunch.exe 33 PID 2840 wrote to memory of 2992 2840 AppLaunch.exe 33 PID 2840 wrote to memory of 2992 2840 AppLaunch.exe 33 PID 2840 wrote to memory of 2992 2840 AppLaunch.exe 33 PID 2840 wrote to memory of 2880 2840 AppLaunch.exe 34 PID 2840 wrote to memory of 2880 2840 AppLaunch.exe 34 PID 2840 wrote to memory of 2880 2840 AppLaunch.exe 34 PID 2840 wrote to memory of 2880 2840 AppLaunch.exe 34 PID 2840 wrote to memory of 2880 2840 AppLaunch.exe 34 PID 2840 wrote to memory of 2880 2840 AppLaunch.exe 34 PID 2840 wrote to memory of 2880 2840 AppLaunch.exe 34 PID 2840 wrote to memory of 2436 2840 AppLaunch.exe 35 PID 2840 wrote to memory of 2436 2840 AppLaunch.exe 35 PID 2840 wrote to memory of 2436 2840 AppLaunch.exe 35 PID 2840 wrote to memory of 2436 2840 AppLaunch.exe 35 PID 2840 wrote to memory of 2436 2840 AppLaunch.exe 35 PID 2840 wrote to memory of 2436 2840 AppLaunch.exe 35 PID 2840 wrote to memory of 2436 2840 AppLaunch.exe 35 PID 2840 wrote to memory of 2688 2840 AppLaunch.exe 37 PID 2840 wrote to memory of 2688 2840 AppLaunch.exe 37 PID 2840 wrote to memory of 2688 2840 AppLaunch.exe 37 PID 2840 wrote to memory of 2688 2840 AppLaunch.exe 37 PID 2840 wrote to memory of 2688 2840 AppLaunch.exe 37 PID 2840 wrote to memory of 2688 2840 AppLaunch.exe 37 PID 2840 wrote to memory of 2688 2840 AppLaunch.exe 37 PID 2880 wrote to memory of 396 2880 cmd.exe 41 PID 2880 wrote to memory of 396 2880 cmd.exe 41 PID 2880 wrote to memory of 396 2880 cmd.exe 41 PID 2880 wrote to memory of 396 2880 cmd.exe 41 PID 2880 wrote to memory of 396 2880 cmd.exe 41 PID 2880 wrote to memory of 396 2880 cmd.exe 41 PID 2880 wrote to memory of 396 2880 cmd.exe 41 PID 2688 wrote to memory of 2068 2688 cmd.exe 42 PID 2688 wrote to memory of 2068 2688 cmd.exe 42 PID 2688 wrote to memory of 2068 2688 cmd.exe 42 PID 2688 wrote to memory of 2068 2688 cmd.exe 42 PID 2688 wrote to memory of 2068 2688 cmd.exe 42 PID 2688 wrote to memory of 2068 2688 cmd.exe 42 PID 2688 wrote to memory of 2068 2688 cmd.exe 42 PID 2992 wrote to memory of 2484 2992 cmd.exe 43 PID 2992 wrote to memory of 2484 2992 cmd.exe 43 PID 2992 wrote to memory of 2484 2992 cmd.exe 43 PID 2992 wrote to memory of 2484 2992 cmd.exe 43 PID 2992 wrote to memory of 2484 2992 cmd.exe 43 PID 2992 wrote to memory of 2484 2992 cmd.exe 43 PID 2992 wrote to memory of 2484 2992 cmd.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3671211d6cbd5f470e4cc32d03a7b730.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2484
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:396
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:836
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\Mar16ABirds.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\Mar16ABirds.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\Mar16ABirds.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\Mar16ABirds.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2068
-
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\ScCore.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\ScCore.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\IEShims.exe"C:\Users\Admin\AppData\Local\Temp\IEShims.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2884 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2456
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
517KB
MD53671211d6cbd5f470e4cc32d03a7b730
SHA154ef4c7cfdb75597f93fd0d9e46e4daef597eb95
SHA2568b4ba0001ecedff27c9ce77a5fea7252caaf2b511c78e64afc62f79f010c79c7
SHA51286c4c57501c0bf41ebb09703e46c6e0ca63af7503088a57f9e1d3d62bc0350bc9ba6ded6e50368d0d1c547ce3c2bae49d50e795430db873d35baa707fa21e7ed
-
Filesize
6KB
MD5fa04679f88ed341ca02a7ecf899e7b98
SHA1a87211346dd0f8e42429122f7069b2d1820ba9d4
SHA256dff69e6b88bac94e9660a49a0f1deff2598675f19396ee26cea8582eabdfc5e3
SHA512118a41a248717066a3ac386a75bdf2ea5cdcc7cae6d58793dca6567a57fa88ca1da4f4ec37948d6bf73d5ba03f4b6066d6cf8922ce85674bdbe0c9996b855e52