Analysis
-
max time kernel
147s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 15:41
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe
-
Size
354KB
-
MD5
4e38afd9fd30083a1f14acad8a0403be
-
SHA1
98f5a992331d95f8c7b7e3f7531e468005a0be56
-
SHA256
524e2ef6dd1762f3f834b779fc032327ce79dc70321f07f5eeaa444574050dd6
-
SHA512
b8a9f514962c44602813e5f5d38092555f16f81cfa25bb3e5f9deef7a13fd22cfde61e179271e462db19cd2b86cfdda997a6811b3c7e75fe40decfb93331a9c8
-
SSDEEP
6144:UOS51+ZGnbYQSrkgKXO4yIjVH7nVjl4euFM2r40tV9wP5zczRcYS:UbAkY549+4tjVbVd5Mnr6PuzRcY
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 17 IoCs
resource yara_rule behavioral2/memory/376-0-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral2/memory/376-2-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral2/memory/376-9-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral2/memory/376-10-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral2/memory/376-11-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral2/memory/376-12-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral2/memory/376-16-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral2/memory/376-20-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral2/memory/376-23-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral2/memory/376-26-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral2/memory/376-30-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral2/memory/376-33-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral2/memory/376-36-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral2/memory/376-40-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral2/memory/376-50-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral2/memory/376-53-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades behavioral2/memory/376-56-0x0000000000400000-0x0000000000459000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\NON UPX.exe = "C:\\Users\\Admin\\AppData\\Roaming\\NON UPX.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\NON UPX.exe" JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\NON UPX.exe" JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\NON UPX.exe" JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3988 set thread context of 376 3988 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2196 reg.exe 2300 reg.exe 4056 reg.exe 2932 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeCreateTokenPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeAssignPrimaryTokenPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeLockMemoryPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeIncreaseQuotaPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeMachineAccountPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeTcbPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeSecurityPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeTakeOwnershipPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeLoadDriverPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeSystemProfilePrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeSystemtimePrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeProfSingleProcessPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeIncBasePriorityPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeCreatePagefilePrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeCreatePermanentPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeBackupPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeRestorePrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeShutdownPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeDebugPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeAuditPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeSystemEnvironmentPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeChangeNotifyPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeRemoteShutdownPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeUndockPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeSyncAgentPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeEnableDelegationPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeManageVolumePrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeImpersonatePrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeCreateGlobalPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: 31 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: 32 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: 33 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: 34 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: 35 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe Token: SeDebugPrivilege 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 3988 wrote to memory of 376 3988 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 92 PID 3988 wrote to memory of 376 3988 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 92 PID 3988 wrote to memory of 376 3988 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 92 PID 3988 wrote to memory of 376 3988 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 92 PID 3988 wrote to memory of 376 3988 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 92 PID 3988 wrote to memory of 376 3988 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 92 PID 3988 wrote to memory of 376 3988 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 92 PID 3988 wrote to memory of 376 3988 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 92 PID 376 wrote to memory of 2356 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 93 PID 376 wrote to memory of 2356 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 93 PID 376 wrote to memory of 2356 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 93 PID 376 wrote to memory of 3212 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 94 PID 376 wrote to memory of 3212 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 94 PID 376 wrote to memory of 3212 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 94 PID 376 wrote to memory of 1356 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 95 PID 376 wrote to memory of 1356 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 95 PID 376 wrote to memory of 1356 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 95 PID 376 wrote to memory of 4268 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 96 PID 376 wrote to memory of 4268 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 96 PID 376 wrote to memory of 4268 376 JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe 96 PID 3212 wrote to memory of 2196 3212 cmd.exe 101 PID 3212 wrote to memory of 2196 3212 cmd.exe 101 PID 3212 wrote to memory of 2196 3212 cmd.exe 101 PID 2356 wrote to memory of 2932 2356 cmd.exe 102 PID 2356 wrote to memory of 2932 2356 cmd.exe 102 PID 2356 wrote to memory of 2932 2356 cmd.exe 102 PID 4268 wrote to memory of 2300 4268 cmd.exe 103 PID 4268 wrote to memory of 2300 4268 cmd.exe 103 PID 4268 wrote to memory of 2300 4268 cmd.exe 103 PID 1356 wrote to memory of 4056 1356 cmd.exe 104 PID 1356 wrote to memory of 4056 1356 cmd.exe 104 PID 1356 wrote to memory of 4056 1356 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2932
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4e38afd9fd30083a1f14acad8a0403be.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2196
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4056
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\NON UPX.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\NON UPX.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\NON UPX.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\NON UPX.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2300
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1