Analysis
-
max time kernel
150s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
03/03/2025, 14:46
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe
-
Size
653KB
-
MD5
47905240f94b6d39e96d68ea9b73166c
-
SHA1
212aa659f181abfce24d39a4b986349d51e72836
-
SHA256
997a2d2c333b1aa6251fc54d600130044ece7ed84e64d3a210848c045fca080c
-
SHA512
e717cb1532938f3e8b80c622a2c53a9ff4c7111cbf424e2050a5c96658e4493452d5922ee60fc12e1e4e68b7cc4076a77d13da2ffbf9ad0a600944a4e2c17567
-
SSDEEP
12288:USy6Hr8InApopMuG9JWOqfK2un5GHNzT41IDuRBovTAQ2PkiKWy9H4pTH+n+fX:dL8IA2pIvqd81IC3ovkKWy9+vP
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 5 IoCs
resource yara_rule behavioral1/memory/2288-7-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades behavioral1/memory/2288-11-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades behavioral1/memory/2288-12-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades behavioral1/memory/2288-13-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades behavioral1/memory/2288-15-0x0000000000400000-0x0000000000474000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1268 set thread context of 2288 1268 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 29 -
resource yara_rule behavioral1/memory/2288-0-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2288-5-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2288-7-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2288-11-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2288-12-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2288-13-0x0000000000400000-0x0000000000474000-memory.dmp upx behavioral1/memory/2288-15-0x0000000000400000-0x0000000000474000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2524 reg.exe 2808 reg.exe 2688 reg.exe 2956 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeCreateTokenPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeAssignPrimaryTokenPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeLockMemoryPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeIncreaseQuotaPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeMachineAccountPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeTcbPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeSecurityPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeTakeOwnershipPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeLoadDriverPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeSystemProfilePrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeSystemtimePrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeProfSingleProcessPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeIncBasePriorityPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeCreatePagefilePrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeCreatePermanentPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeBackupPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeRestorePrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeShutdownPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeDebugPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeAuditPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeSystemEnvironmentPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeChangeNotifyPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeRemoteShutdownPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeUndockPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeSyncAgentPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeEnableDelegationPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeManageVolumePrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeImpersonatePrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeCreateGlobalPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: 31 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: 32 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: 33 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: 34 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: 35 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe Token: SeDebugPrivilege 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1268 wrote to memory of 2288 1268 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 29 PID 1268 wrote to memory of 2288 1268 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 29 PID 1268 wrote to memory of 2288 1268 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 29 PID 1268 wrote to memory of 2288 1268 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 29 PID 1268 wrote to memory of 2288 1268 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 29 PID 1268 wrote to memory of 2288 1268 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 29 PID 1268 wrote to memory of 2288 1268 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 29 PID 1268 wrote to memory of 2288 1268 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 29 PID 1268 wrote to memory of 2288 1268 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 29 PID 1268 wrote to memory of 2288 1268 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 29 PID 1268 wrote to memory of 2288 1268 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 29 PID 2288 wrote to memory of 2188 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 30 PID 2288 wrote to memory of 2188 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 30 PID 2288 wrote to memory of 2188 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 30 PID 2288 wrote to memory of 2188 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 30 PID 2288 wrote to memory of 2392 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 31 PID 2288 wrote to memory of 2392 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 31 PID 2288 wrote to memory of 2392 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 31 PID 2288 wrote to memory of 2392 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 31 PID 2288 wrote to memory of 828 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 32 PID 2288 wrote to memory of 828 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 32 PID 2288 wrote to memory of 828 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 32 PID 2288 wrote to memory of 828 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 32 PID 2288 wrote to memory of 2496 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 33 PID 2288 wrote to memory of 2496 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 33 PID 2288 wrote to memory of 2496 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 33 PID 2288 wrote to memory of 2496 2288 JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe 33 PID 2392 wrote to memory of 2808 2392 cmd.exe 38 PID 2392 wrote to memory of 2808 2392 cmd.exe 38 PID 2392 wrote to memory of 2808 2392 cmd.exe 38 PID 2392 wrote to memory of 2808 2392 cmd.exe 38 PID 828 wrote to memory of 2688 828 cmd.exe 39 PID 828 wrote to memory of 2688 828 cmd.exe 39 PID 828 wrote to memory of 2688 828 cmd.exe 39 PID 828 wrote to memory of 2688 828 cmd.exe 39 PID 2496 wrote to memory of 2524 2496 cmd.exe 40 PID 2496 wrote to memory of 2524 2496 cmd.exe 40 PID 2496 wrote to memory of 2524 2496 cmd.exe 40 PID 2496 wrote to memory of 2524 2496 cmd.exe 40 PID 2188 wrote to memory of 2956 2188 cmd.exe 41 PID 2188 wrote to memory of 2956 2188 cmd.exe 41 PID 2188 wrote to memory of 2956 2188 cmd.exe 41 PID 2188 wrote to memory of 2956 2188 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe"1⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2956
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_47905240f94b6d39e96d68ea9b73166c.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2808
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2688
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2524
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD5680554fe061acf34f8a4c11725c6b52c
SHA1ebf25d1d9ed380666ea5b4579bfd598976e10fae
SHA256ee0d621a28bd99daaa6542eee20a259dd8dad2d9be9afc5846a9cfa07b93edbf
SHA51298f295aac9ed8aee648d143c327e45c664bd910c6f99cdae03c1613f4e64f25b3672e4af639f73eee2ffd53ea6e1ef77005dfbfac87652a79bd47d9fb20c5c6c