Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
05/03/2025, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe
-
Size
2.7MB
-
MD5
51ac72aa5af11079f2c2ca22d0bf036e
-
SHA1
babda013a93e16274212ff57c1eef55856594eeb
-
SHA256
6ea32525bdd7fb538e97a9ec22b4e7e8c4f3d062d04ec64224f19fef3f6b76f4
-
SHA512
472aee0848f843784375c578a5afc6d3887099ef6e1841fe9bc24923032ec0fabce7ca0a51fac8ffc4f77393c44ec40dcc947ac5d6aa9ef2b334b7cc5e232e5f
-
SSDEEP
24576:7X1b1wQfjhVGQzqy7fzyW15DjezqzBxxzyVFwYF69Vi4KtftNdmQgfLaO3TE6L6f:Hn8W66KpHQoRDwNQDxn
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 4 IoCs
resource yara_rule behavioral1/memory/2108-37-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral1/memory/2108-55-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral1/memory/2108-33-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral1/memory/2108-300-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\uncrypted.exe = "C:\\Users\\Admin\\AppData\\Roaming\\uncrypted.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\uncrypted.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\uncrypted.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Executes dropped EXE 4 IoCs
pid Process 2596 uncrypted.exe 2548 setup (2).exe 2108 WinSec.exe 2812 setup (2).tmp -
Loads dropped DLL 9 IoCs
pid Process 2604 JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe 2604 JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe 2596 uncrypted.exe 2604 JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe 2548 setup (2).exe 2812 setup (2).tmp 2812 setup (2).tmp 2812 setup (2).tmp 2812 setup (2).tmp -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2596 set thread context of 2108 2596 uncrypted.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup (2).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinSec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup (2).tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uncrypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 676 reg.exe 1732 reg.exe 1720 reg.exe 2340 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 2108 WinSec.exe Token: SeCreateTokenPrivilege 2108 WinSec.exe Token: SeAssignPrimaryTokenPrivilege 2108 WinSec.exe Token: SeLockMemoryPrivilege 2108 WinSec.exe Token: SeIncreaseQuotaPrivilege 2108 WinSec.exe Token: SeMachineAccountPrivilege 2108 WinSec.exe Token: SeTcbPrivilege 2108 WinSec.exe Token: SeSecurityPrivilege 2108 WinSec.exe Token: SeTakeOwnershipPrivilege 2108 WinSec.exe Token: SeLoadDriverPrivilege 2108 WinSec.exe Token: SeSystemProfilePrivilege 2108 WinSec.exe Token: SeSystemtimePrivilege 2108 WinSec.exe Token: SeProfSingleProcessPrivilege 2108 WinSec.exe Token: SeIncBasePriorityPrivilege 2108 WinSec.exe Token: SeCreatePagefilePrivilege 2108 WinSec.exe Token: SeCreatePermanentPrivilege 2108 WinSec.exe Token: SeBackupPrivilege 2108 WinSec.exe Token: SeRestorePrivilege 2108 WinSec.exe Token: SeShutdownPrivilege 2108 WinSec.exe Token: SeDebugPrivilege 2108 WinSec.exe Token: SeAuditPrivilege 2108 WinSec.exe Token: SeSystemEnvironmentPrivilege 2108 WinSec.exe Token: SeChangeNotifyPrivilege 2108 WinSec.exe Token: SeRemoteShutdownPrivilege 2108 WinSec.exe Token: SeUndockPrivilege 2108 WinSec.exe Token: SeSyncAgentPrivilege 2108 WinSec.exe Token: SeEnableDelegationPrivilege 2108 WinSec.exe Token: SeManageVolumePrivilege 2108 WinSec.exe Token: SeImpersonatePrivilege 2108 WinSec.exe Token: SeCreateGlobalPrivilege 2108 WinSec.exe Token: 31 2108 WinSec.exe Token: 32 2108 WinSec.exe Token: 33 2108 WinSec.exe Token: 34 2108 WinSec.exe Token: 35 2108 WinSec.exe Token: SeDebugPrivilege 2108 WinSec.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2108 WinSec.exe 2108 WinSec.exe 2812 setup (2).tmp 2108 WinSec.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2596 2604 JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe 30 PID 2604 wrote to memory of 2596 2604 JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe 30 PID 2604 wrote to memory of 2596 2604 JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe 30 PID 2604 wrote to memory of 2596 2604 JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe 30 PID 2604 wrote to memory of 2548 2604 JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe 32 PID 2604 wrote to memory of 2548 2604 JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe 32 PID 2604 wrote to memory of 2548 2604 JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe 32 PID 2604 wrote to memory of 2548 2604 JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe 32 PID 2604 wrote to memory of 2548 2604 JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe 32 PID 2604 wrote to memory of 2548 2604 JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe 32 PID 2604 wrote to memory of 2548 2604 JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe 32 PID 2596 wrote to memory of 2108 2596 uncrypted.exe 31 PID 2596 wrote to memory of 2108 2596 uncrypted.exe 31 PID 2596 wrote to memory of 2108 2596 uncrypted.exe 31 PID 2596 wrote to memory of 2108 2596 uncrypted.exe 31 PID 2596 wrote to memory of 2108 2596 uncrypted.exe 31 PID 2596 wrote to memory of 2108 2596 uncrypted.exe 31 PID 2596 wrote to memory of 2108 2596 uncrypted.exe 31 PID 2596 wrote to memory of 2108 2596 uncrypted.exe 31 PID 2596 wrote to memory of 2108 2596 uncrypted.exe 31 PID 2596 wrote to memory of 2108 2596 uncrypted.exe 31 PID 2548 wrote to memory of 2812 2548 setup (2).exe 33 PID 2548 wrote to memory of 2812 2548 setup (2).exe 33 PID 2548 wrote to memory of 2812 2548 setup (2).exe 33 PID 2548 wrote to memory of 2812 2548 setup (2).exe 33 PID 2548 wrote to memory of 2812 2548 setup (2).exe 33 PID 2548 wrote to memory of 2812 2548 setup (2).exe 33 PID 2548 wrote to memory of 2812 2548 setup (2).exe 33 PID 2108 wrote to memory of 1356 2108 WinSec.exe 34 PID 2108 wrote to memory of 1356 2108 WinSec.exe 34 PID 2108 wrote to memory of 1356 2108 WinSec.exe 34 PID 2108 wrote to memory of 1356 2108 WinSec.exe 34 PID 2108 wrote to memory of 2708 2108 WinSec.exe 35 PID 2108 wrote to memory of 2708 2108 WinSec.exe 35 PID 2108 wrote to memory of 2708 2108 WinSec.exe 35 PID 2108 wrote to memory of 2708 2108 WinSec.exe 35 PID 2108 wrote to memory of 2704 2108 WinSec.exe 36 PID 2108 wrote to memory of 2704 2108 WinSec.exe 36 PID 2108 wrote to memory of 2704 2108 WinSec.exe 36 PID 2108 wrote to memory of 2704 2108 WinSec.exe 36 PID 2108 wrote to memory of 2816 2108 WinSec.exe 37 PID 2108 wrote to memory of 2816 2108 WinSec.exe 37 PID 2108 wrote to memory of 2816 2108 WinSec.exe 37 PID 2108 wrote to memory of 2816 2108 WinSec.exe 37 PID 2704 wrote to memory of 2340 2704 cmd.exe 42 PID 2704 wrote to memory of 2340 2704 cmd.exe 42 PID 2704 wrote to memory of 2340 2704 cmd.exe 42 PID 2704 wrote to memory of 2340 2704 cmd.exe 42 PID 2816 wrote to memory of 1720 2816 cmd.exe 43 PID 2816 wrote to memory of 1720 2816 cmd.exe 43 PID 2816 wrote to memory of 1720 2816 cmd.exe 43 PID 2816 wrote to memory of 1720 2816 cmd.exe 43 PID 1356 wrote to memory of 1732 1356 cmd.exe 44 PID 1356 wrote to memory of 1732 1356 cmd.exe 44 PID 1356 wrote to memory of 1732 1356 cmd.exe 44 PID 1356 wrote to memory of 1732 1356 cmd.exe 44 PID 2708 wrote to memory of 676 2708 cmd.exe 45 PID 2708 wrote to memory of 676 2708 cmd.exe 45 PID 2708 wrote to memory of 676 2708 cmd.exe 45 PID 2708 wrote to memory of 676 2708 cmd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\uncrypted.exe"C:\Users\Admin\AppData\Local\Temp\uncrypted.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Roaming\WinSec.exeC:\Users\Admin\AppData\Roaming\WinSec.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1732
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\uncrypted.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\uncrypted.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\uncrypted.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\uncrypted.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:676
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2340
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\uncrypted.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\uncrypted.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\uncrypted.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\uncrypted.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1720
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup (2).exe"C:\Users\Admin\AppData\Local\Temp\setup (2).exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\is-URSGV.tmp\setup (2).tmp"C:\Users\Admin\AppData\Local\Temp\is-URSGV.tmp\setup (2).tmp" /SL5="$6015E,402752,54272,C:\Users\Admin\AppData\Local\Temp\setup (2).exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD505a388d845a9457b468e6eef880b0696
SHA19f5c19ba4b2ae0a4302efd0e5cc289cef8ebacc5
SHA256304165716e3060cf31c91504432ab191604890e3c487a568a21d15eaae231a14
SHA5127f5102543c5dbb296224b304eb2a3ef0c150171429e38780b092480a1fed0a2d541684a0f0453d5aa393221261695795e53d5f779c7ce1721cafb5fb85a89250
-
Filesize
529KB
MD5663ce82c52435d68e20910f6a7252725
SHA1ef6719db6ec6209dd832d0a336ddccef87343a4d
SHA256b097cc6db98c456381b1c2f5e4827dde3480c2f0e9561cae81d33d5efd8104ed
SHA51286be243024e0c055d13516c8568090f3fc5347fd0d6764be8c64f08c753c1f3cc4db00af5c2746e97c74e2f01292b5bcc855a2b94b8cb95cacfd53dd66b28fa0
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
363KB
MD5b31ad1bacfd7c51f35e052b8c7047d44
SHA1ba58ae4a4a28cd2a4c2a7b85d260e105fa6e79de
SHA256117ae53cf3e8bc95e6297a15d8365efd792da04df90744d4e244bbf72075ccc3
SHA5122a4c0d3f7065a9272bd70e8fd121e80d9c4e3d9089285841b245790f4789704c27cb88333ddbf3bbecbc26af926b7ffd7a722352c7f418c84a9087cb1a748368
-
Filesize
688KB
MD5c765336f0dcf4efdcc2101eed67cd30c
SHA1fa0279f59738c5aa3b6b20106e109ccd77f895a7
SHA256c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28
SHA51206a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891
-
Filesize
643KB
MD52c3e4950bf80b2098dce2f57b81a6611
SHA1bc665b0584dad1e9187d52ecc35449c299e36888
SHA25646ca5acf36f5864c677c9ccbbdffa44f3451974283e8d645834c55f4e64b4486
SHA512d904563c9b612d1d7c655398fac5766addde83212d6df18889f28f2864d30ad20758877418fa662f1b44eeacbbba61d379690a26e596652def911cf94d50d7fc
-
Filesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2