Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 13:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe
-
Size
292KB
-
MD5
523f04e11cd625c15e72b2261dc240b8
-
SHA1
2bb18ca007793a8a3c5f051f09eb450c156e3a82
-
SHA256
af676fdc5414af52a261661e2c9fda1779c0c8f47cb4fdd8094cb09abac8bef6
-
SHA512
e157d01abd292fdb9bba781fb4e666f1e386a46431678fdd474884c9965070052755c8595edf513eb30e4ea6c156a5db96a8649b3b75ea9ba077855b52f2d8db
-
SSDEEP
6144:HlmiYtJM2IjYznwNdZZ5fwVLWurtfG3aYlkWAoKs7XcQ9FMIti9O:HeLZzn6ZHfurt2lkZoKs7XcQXTd
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 1 IoCs
resource yara_rule behavioral2/memory/1104-16-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe -
Executes dropped EXE 2 IoCs
pid Process 4296 winsense.exe 1104 winsense.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Sensory = "C:\\Users\\Admin\\AppData\\Local\\Temp\\winsense.exe" winsense.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4296 set thread context of 1104 4296 winsense.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4344 1104 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winsense.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2836 cmd.exe 520 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 520 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4296 winsense.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1104 winsense.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 5112 wrote to memory of 4296 5112 JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe 87 PID 5112 wrote to memory of 4296 5112 JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe 87 PID 5112 wrote to memory of 4296 5112 JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe 87 PID 5112 wrote to memory of 2836 5112 JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe 88 PID 5112 wrote to memory of 2836 5112 JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe 88 PID 5112 wrote to memory of 2836 5112 JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe 88 PID 4296 wrote to memory of 1104 4296 winsense.exe 90 PID 4296 wrote to memory of 1104 4296 winsense.exe 90 PID 4296 wrote to memory of 1104 4296 winsense.exe 90 PID 4296 wrote to memory of 1104 4296 winsense.exe 90 PID 4296 wrote to memory of 1104 4296 winsense.exe 90 PID 4296 wrote to memory of 1104 4296 winsense.exe 90 PID 4296 wrote to memory of 1104 4296 winsense.exe 90 PID 4296 wrote to memory of 1104 4296 winsense.exe 90 PID 2836 wrote to memory of 520 2836 cmd.exe 92 PID 2836 wrote to memory of 520 2836 cmd.exe 92 PID 2836 wrote to memory of 520 2836 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\winsense.exe"C:\Users\Admin\AppData\Local\Temp\winsense.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\winsense.exeC:\Users\Admin\AppData\Local\Temp\winsense.exe3⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1104 -s 124⤵
- Program crash
PID:4344
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_523f04e11cd625c15e72b2261dc240b8.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:520
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1104 -ip 11041⤵PID:1640
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD576f662464f938a4c4925a29b2ad1a40e
SHA120a44612b173e7c227a1f85b45ce87c7fda32d03
SHA2560aa726ef8fde509f06a9a8f67b0db443eb9d8b83113834e969eb8a3b5502bb17
SHA512f5688b9148f3b0fed4bf9f527c2ef62cfe387e5ec6b68087ffa31c5ab7d1c7b15f2288bdea47a2be445ef86b277c56d37ae985c360485ef1a55b14f31d0dbcf9