Analysis

  • max time kernel
    148s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2025, 14:06

General

  • Target

    JaffaCakes118_56a3201e29e17e386a1e7102d44becd8.exe

  • Size

    1.6MB

  • MD5

    56a3201e29e17e386a1e7102d44becd8

  • SHA1

    4f52762a49f6c0e75a51dc3e62178542b55cff06

  • SHA256

    8b89276a5097877a3e1acef6a8c833c78be3b59f1ab83b519031ef984bb06060

  • SHA512

    5ef0fdbadcf5ed0441d66dc666d14249f994458a50f1c7d88e1eb51dd3e8d03a759d46ed01f97cd0622af9b86551a841aacc84e774c7c9c1826fe42a669c6cda

  • SSDEEP

    12288:KeCmbLFzEN3A6R1WP7vy0PqYz2bsfhH7EvIyzjy+uRXuQ7BvLEd3HX9y:OmNPbmzjy+EzI9y

Malware Config

Signatures

  • Blackshades

    Blackshades is a remote access trojan with various capabilities.

  • Blackshades family
  • Blackshades payload 11 IoCs
  • Modifies firewall policy service 3 TTPs 10 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_56a3201e29e17e386a1e7102d44becd8.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_56a3201e29e17e386a1e7102d44becd8.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qZTSn.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4880
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Window Updates" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\windowupdates_02.exe" /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4876
    • C:\Users\Admin\AppData\Roaming\Window Updates\windowupdates_02.exe
      "C:\Users\Admin\AppData\Roaming\Window Updates\windowupdates_02.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4928
      • C:\Users\Admin\AppData\Roaming\Window Updates\windowupdates_02.exe
        "C:\Users\Admin\AppData\Roaming\Window Updates\windowupdates_02.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3624
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4144
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:3540
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Window Updates\windowupdates_02.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\windowupdates_02.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5044
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Window Updates\windowupdates_02.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Window Updates\windowupdates_02.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:4424
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2184
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:3016
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Windows Updater.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Updater.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3000
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Windows Updater.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Updater.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:2444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\qZTSn.txt

    Filesize

    167B

    MD5

    477c27332fc112e4f0cf76a5a09e64e1

    SHA1

    5a3b531dba82da553213b23ec3cd477730b4fa19

    SHA256

    2e7e2becf2dd46169bf1c3094e8551e2a8cc0a4401169e2ab4607ec93c630e89

    SHA512

    6dd0b686e0a5ec4fa88782583654f51b8a7a0c900a9bbb4ed7e4ca907e59fb657d2344350832f5c43969c481a811700d4e5beaf65189db2ab8bd8bdb301d3b15

  • C:\Users\Admin\AppData\Roaming\Window Updates\windowupdates_02.txt

    Filesize

    1.6MB

    MD5

    336969c0b30389246e9a17437bd38302

    SHA1

    12f3d1d6f58d410f0f4cc16d99670a3ba3d993f2

    SHA256

    7aa9543acb50524b4cb846220e4355fa2853d2c456879dab65b981e846dc6882

    SHA512

    ecb112465e15f2b786a298a61ee8d28eacfd0e2e5ad2fba61d1b179d731f026c9b446c34caa17204a7a81da10a8cb6fa886f0fe2dbf67bdb91d6143531441c66

  • memory/3624-32-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/3624-29-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/3624-34-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/3624-40-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/3624-42-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/3624-44-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/3624-45-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/3624-46-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/3624-48-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/3624-49-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/3624-52-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/3624-53-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/3624-57-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB