Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe
-
Size
2.7MB
-
MD5
51ac72aa5af11079f2c2ca22d0bf036e
-
SHA1
babda013a93e16274212ff57c1eef55856594eeb
-
SHA256
6ea32525bdd7fb538e97a9ec22b4e7e8c4f3d062d04ec64224f19fef3f6b76f4
-
SHA512
472aee0848f843784375c578a5afc6d3887099ef6e1841fe9bc24923032ec0fabce7ca0a51fac8ffc4f77393c44ec40dcc947ac5d6aa9ef2b334b7cc5e232e5f
-
SSDEEP
24576:7X1b1wQfjhVGQzqy7fzyW15DjezqzBxxzyVFwYF69Vi4KtftNdmQgfLaO3TE6L6f:Hn8W66KpHQoRDwNQDxn
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 3 IoCs
resource yara_rule behavioral2/memory/4120-43-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/4120-39-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades behavioral2/memory/4120-209-0x0000000000400000-0x0000000000471000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\uncrypted.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\uncrypted.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\uncrypted.exe = "C:\\Users\\Admin\\AppData\\Roaming\\uncrypted.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe -
Executes dropped EXE 4 IoCs
pid Process 392 uncrypted.exe 1928 setup (2).exe 4120 WinSec.exe 116 setup (2).tmp -
Loads dropped DLL 3 IoCs
pid Process 116 setup (2).tmp 116 setup (2).tmp 116 setup (2).tmp -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 392 set thread context of 4120 392 uncrypted.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uncrypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup (2).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup (2).tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinSec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2124 reg.exe 232 reg.exe 4032 reg.exe 4484 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 4120 WinSec.exe Token: SeCreateTokenPrivilege 4120 WinSec.exe Token: SeAssignPrimaryTokenPrivilege 4120 WinSec.exe Token: SeLockMemoryPrivilege 4120 WinSec.exe Token: SeIncreaseQuotaPrivilege 4120 WinSec.exe Token: SeMachineAccountPrivilege 4120 WinSec.exe Token: SeTcbPrivilege 4120 WinSec.exe Token: SeSecurityPrivilege 4120 WinSec.exe Token: SeTakeOwnershipPrivilege 4120 WinSec.exe Token: SeLoadDriverPrivilege 4120 WinSec.exe Token: SeSystemProfilePrivilege 4120 WinSec.exe Token: SeSystemtimePrivilege 4120 WinSec.exe Token: SeProfSingleProcessPrivilege 4120 WinSec.exe Token: SeIncBasePriorityPrivilege 4120 WinSec.exe Token: SeCreatePagefilePrivilege 4120 WinSec.exe Token: SeCreatePermanentPrivilege 4120 WinSec.exe Token: SeBackupPrivilege 4120 WinSec.exe Token: SeRestorePrivilege 4120 WinSec.exe Token: SeShutdownPrivilege 4120 WinSec.exe Token: SeDebugPrivilege 4120 WinSec.exe Token: SeAuditPrivilege 4120 WinSec.exe Token: SeSystemEnvironmentPrivilege 4120 WinSec.exe Token: SeChangeNotifyPrivilege 4120 WinSec.exe Token: SeRemoteShutdownPrivilege 4120 WinSec.exe Token: SeUndockPrivilege 4120 WinSec.exe Token: SeSyncAgentPrivilege 4120 WinSec.exe Token: SeEnableDelegationPrivilege 4120 WinSec.exe Token: SeManageVolumePrivilege 4120 WinSec.exe Token: SeImpersonatePrivilege 4120 WinSec.exe Token: SeCreateGlobalPrivilege 4120 WinSec.exe Token: 31 4120 WinSec.exe Token: 32 4120 WinSec.exe Token: 33 4120 WinSec.exe Token: 34 4120 WinSec.exe Token: 35 4120 WinSec.exe Token: SeDebugPrivilege 4120 WinSec.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4120 WinSec.exe 4120 WinSec.exe 4120 WinSec.exe 116 setup (2).tmp -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 4244 wrote to memory of 392 4244 JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe 87 PID 4244 wrote to memory of 392 4244 JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe 87 PID 4244 wrote to memory of 392 4244 JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe 87 PID 4244 wrote to memory of 1928 4244 JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe 88 PID 4244 wrote to memory of 1928 4244 JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe 88 PID 4244 wrote to memory of 1928 4244 JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe 88 PID 392 wrote to memory of 4120 392 uncrypted.exe 89 PID 392 wrote to memory of 4120 392 uncrypted.exe 89 PID 392 wrote to memory of 4120 392 uncrypted.exe 89 PID 392 wrote to memory of 4120 392 uncrypted.exe 89 PID 392 wrote to memory of 4120 392 uncrypted.exe 89 PID 392 wrote to memory of 4120 392 uncrypted.exe 89 PID 392 wrote to memory of 4120 392 uncrypted.exe 89 PID 392 wrote to memory of 4120 392 uncrypted.exe 89 PID 392 wrote to memory of 4120 392 uncrypted.exe 89 PID 392 wrote to memory of 4120 392 uncrypted.exe 89 PID 1928 wrote to memory of 116 1928 setup (2).exe 90 PID 1928 wrote to memory of 116 1928 setup (2).exe 90 PID 1928 wrote to memory of 116 1928 setup (2).exe 90 PID 4120 wrote to memory of 4516 4120 WinSec.exe 91 PID 4120 wrote to memory of 4516 4120 WinSec.exe 91 PID 4120 wrote to memory of 4516 4120 WinSec.exe 91 PID 4120 wrote to memory of 112 4120 WinSec.exe 92 PID 4120 wrote to memory of 112 4120 WinSec.exe 92 PID 4120 wrote to memory of 112 4120 WinSec.exe 92 PID 4120 wrote to memory of 744 4120 WinSec.exe 93 PID 4120 wrote to memory of 744 4120 WinSec.exe 93 PID 4120 wrote to memory of 744 4120 WinSec.exe 93 PID 4120 wrote to memory of 3528 4120 WinSec.exe 94 PID 4120 wrote to memory of 3528 4120 WinSec.exe 94 PID 4120 wrote to memory of 3528 4120 WinSec.exe 94 PID 744 wrote to memory of 4484 744 cmd.exe 99 PID 744 wrote to memory of 4484 744 cmd.exe 99 PID 744 wrote to memory of 4484 744 cmd.exe 99 PID 3528 wrote to memory of 4032 3528 cmd.exe 100 PID 3528 wrote to memory of 4032 3528 cmd.exe 100 PID 3528 wrote to memory of 4032 3528 cmd.exe 100 PID 4516 wrote to memory of 232 4516 cmd.exe 101 PID 4516 wrote to memory of 232 4516 cmd.exe 101 PID 4516 wrote to memory of 232 4516 cmd.exe 101 PID 112 wrote to memory of 2124 112 cmd.exe 102 PID 112 wrote to memory of 2124 112 cmd.exe 102 PID 112 wrote to memory of 2124 112 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_51ac72aa5af11079f2c2ca22d0bf036e.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\uncrypted.exe"C:\Users\Admin\AppData\Local\Temp\uncrypted.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Roaming\WinSec.exeC:\Users\Admin\AppData\Roaming\WinSec.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:232
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\uncrypted.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\uncrypted.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\uncrypted.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\uncrypted.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2124
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4484
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\uncrypted.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\uncrypted.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\uncrypted.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\uncrypted.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4032
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\setup (2).exe"C:\Users\Admin\AppData\Local\Temp\setup (2).exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\is-CFP4K.tmp\setup (2).tmp"C:\Users\Admin\AppData\Local\Temp\is-CFP4K.tmp\setup (2).tmp" /SL5="$60236,402752,54272,C:\Users\Admin\AppData\Local\Temp\setup (2).exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:116
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
529KB
MD5663ce82c52435d68e20910f6a7252725
SHA1ef6719db6ec6209dd832d0a336ddccef87343a4d
SHA256b097cc6db98c456381b1c2f5e4827dde3480c2f0e9561cae81d33d5efd8104ed
SHA51286be243024e0c055d13516c8568090f3fc5347fd0d6764be8c64f08c753c1f3cc4db00af5c2746e97c74e2f01292b5bcc855a2b94b8cb95cacfd53dd66b28fa0
-
Filesize
363KB
MD5b31ad1bacfd7c51f35e052b8c7047d44
SHA1ba58ae4a4a28cd2a4c2a7b85d260e105fa6e79de
SHA256117ae53cf3e8bc95e6297a15d8365efd792da04df90744d4e244bbf72075ccc3
SHA5122a4c0d3f7065a9272bd70e8fd121e80d9c4e3d9089285841b245790f4789704c27cb88333ddbf3bbecbc26af926b7ffd7a722352c7f418c84a9087cb1a748368
-
Filesize
688KB
MD5c765336f0dcf4efdcc2101eed67cd30c
SHA1fa0279f59738c5aa3b6b20106e109ccd77f895a7
SHA256c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28
SHA51206a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891
-
Filesize
643KB
MD52c3e4950bf80b2098dce2f57b81a6611
SHA1bc665b0584dad1e9187d52ecc35449c299e36888
SHA25646ca5acf36f5864c677c9ccbbdffa44f3451974283e8d645834c55f4e64b4486
SHA512d904563c9b612d1d7c655398fac5766addde83212d6df18889f28f2864d30ad20758877418fa662f1b44eeacbbba61d379690a26e596652def911cf94d50d7fc
-
Filesize
544KB
MD505a388d845a9457b468e6eef880b0696
SHA19f5c19ba4b2ae0a4302efd0e5cc289cef8ebacc5
SHA256304165716e3060cf31c91504432ab191604890e3c487a568a21d15eaae231a14
SHA5127f5102543c5dbb296224b304eb2a3ef0c150171429e38780b092480a1fed0a2d541684a0f0453d5aa393221261695795e53d5f779c7ce1721cafb5fb85a89250
-
Filesize
34KB
MD5e118330b4629b12368d91b9df6488be0
SHA1ce90218c7e3b90df2a3409ec253048bb6472c2fd
SHA2563a0f2936b8c45e8ba3458d69d7859a63844469e698652e15fb56639d32f40cc9
SHA512ac91c04cb20223dbaaf594440cb778dff36e857921be427c8528ba4c6cdb3e8bf8e71e1ae8af7bde9c04ff5b97b379231625bc1a2b66aba2f98cd340cd8a94b0