Analysis

  • max time kernel
    148s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/03/2025, 10:09

General

  • Target

    JaffaCakes118_4cb6af13810817c3bbcffa152e1a7450.exe

  • Size

    560KB

  • MD5

    4cb6af13810817c3bbcffa152e1a7450

  • SHA1

    82d1b01f6436e15bd3b8f51d98ede88c6e4fca1b

  • SHA256

    0637f2096c81d3e6be9fdb03cd79a512f8e878f48e7e172c6e7a918890070003

  • SHA512

    b04f42e86562f917487f5f58b6cbea9ee94e611661b5dd4608f3a8f549c2a9c549b9fdfd0cc2ccfbf624223afae7bd007a6619c1a16a52657afe2d9f0f62f60b

  • SSDEEP

    12288:3Sy6Hr8InApopMuG9JWOqfK2un5GHNzD41IDuRBovTAQ2PkiKWy9H4pTH+nr:QL8IA2pIvqdM1IC3ovkKWy9+Q

Malware Config

Signatures

  • Blackshades

    Blackshades is a remote access trojan with various capabilities.

  • Blackshades family
  • Blackshades payload 14 IoCs
  • Modifies firewall policy service 3 TTPs 8 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4cb6af13810817c3bbcffa152e1a7450.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4cb6af13810817c3bbcffa152e1a7450.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4cb6af13810817c3bbcffa152e1a7450.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4cb6af13810817c3bbcffa152e1a7450.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:916
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2876
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4cb6af13810817c3bbcffa152e1a7450.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4cb6af13810817c3bbcffa152e1a7450.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1792
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4cb6af13810817c3bbcffa152e1a7450.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4cb6af13810817c3bbcffa152e1a7450.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2816
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2208
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2760
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\server.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\server.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2888
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\server.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\server.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\data.dat

    Filesize

    33B

    MD5

    f191181303d20b4bec3e139764a7bf64

    SHA1

    9dae23c7f6ae5cb81097fbdb3b4a976b5030f81b

    SHA256

    44a8092fe8dbb1dc14fc61cbd2749325512ee8fc3cc9a802081ecf5da70b6e58

    SHA512

    48345d51bf11ed473e0644bbf0fc004d7192deae7c26bd7df7c1d6a185df0932af04c52f91e903f301d586f2613b6593012d5bf1b89b0a19f2b17c6e8e5ba1b0

  • memory/2572-20-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/2572-24-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/2572-4-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/2572-8-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/2572-14-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/2572-16-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/2572-19-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/2572-0-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/2572-3-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/2572-21-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/2572-23-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/2572-25-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/2572-27-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/2572-29-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/2572-2-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/2572-31-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/2572-32-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/2572-33-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB