Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_57449e4ec51e0e580ea3fd9373e5b993.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_57449e4ec51e0e580ea3fd9373e5b993.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_57449e4ec51e0e580ea3fd9373e5b993.exe
-
Size
828KB
-
MD5
57449e4ec51e0e580ea3fd9373e5b993
-
SHA1
b7c7174467a77b06f3a52d24129c14327d01a272
-
SHA256
b0b7826222f2111b2eff65ac0340d27d9e8ce4bafa0556dea43bc51f3d4a53c0
-
SHA512
5f418cf9760c3f6cb36670a47c6270d8c4e2570b05b0c8ef51cb09dd43ec8cac66f2de9b7cd8caf4bcb06af5785abf034faad183153b5442882c99541c928560
-
SSDEEP
12288:jcNaZqYtGuiMsUprCMj3QEZcQTScEirp5NzSZALU:jcNatCMsUprC3QTj5tU
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 16 IoCs
resource yara_rule behavioral2/memory/4568-6-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/4568-12-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/4568-16-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/4568-20-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/4568-19-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/4568-21-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/4568-22-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/4568-26-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/4568-30-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/4568-33-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/4568-36-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/4568-40-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/4568-43-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/4568-50-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/4568-56-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/4568-63-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\flash.exe = "C:\\Users\\Admin\\AppData\\Roaming\\flash.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\gpvjaymn.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gpvjaymn.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Executes dropped EXE 1 IoCs
pid Process 4568 gpvjaymn.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4836 set thread context of 4568 4836 JaffaCakes118_57449e4ec51e0e580ea3fd9373e5b993.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_57449e4ec51e0e580ea3fd9373e5b993.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gpvjaymn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2012 reg.exe 4432 reg.exe 3652 reg.exe 1328 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 4568 gpvjaymn.exe Token: SeCreateTokenPrivilege 4568 gpvjaymn.exe Token: SeAssignPrimaryTokenPrivilege 4568 gpvjaymn.exe Token: SeLockMemoryPrivilege 4568 gpvjaymn.exe Token: SeIncreaseQuotaPrivilege 4568 gpvjaymn.exe Token: SeMachineAccountPrivilege 4568 gpvjaymn.exe Token: SeTcbPrivilege 4568 gpvjaymn.exe Token: SeSecurityPrivilege 4568 gpvjaymn.exe Token: SeTakeOwnershipPrivilege 4568 gpvjaymn.exe Token: SeLoadDriverPrivilege 4568 gpvjaymn.exe Token: SeSystemProfilePrivilege 4568 gpvjaymn.exe Token: SeSystemtimePrivilege 4568 gpvjaymn.exe Token: SeProfSingleProcessPrivilege 4568 gpvjaymn.exe Token: SeIncBasePriorityPrivilege 4568 gpvjaymn.exe Token: SeCreatePagefilePrivilege 4568 gpvjaymn.exe Token: SeCreatePermanentPrivilege 4568 gpvjaymn.exe Token: SeBackupPrivilege 4568 gpvjaymn.exe Token: SeRestorePrivilege 4568 gpvjaymn.exe Token: SeShutdownPrivilege 4568 gpvjaymn.exe Token: SeDebugPrivilege 4568 gpvjaymn.exe Token: SeAuditPrivilege 4568 gpvjaymn.exe Token: SeSystemEnvironmentPrivilege 4568 gpvjaymn.exe Token: SeChangeNotifyPrivilege 4568 gpvjaymn.exe Token: SeRemoteShutdownPrivilege 4568 gpvjaymn.exe Token: SeUndockPrivilege 4568 gpvjaymn.exe Token: SeSyncAgentPrivilege 4568 gpvjaymn.exe Token: SeEnableDelegationPrivilege 4568 gpvjaymn.exe Token: SeManageVolumePrivilege 4568 gpvjaymn.exe Token: SeImpersonatePrivilege 4568 gpvjaymn.exe Token: SeCreateGlobalPrivilege 4568 gpvjaymn.exe Token: 31 4568 gpvjaymn.exe Token: 32 4568 gpvjaymn.exe Token: 33 4568 gpvjaymn.exe Token: 34 4568 gpvjaymn.exe Token: 35 4568 gpvjaymn.exe Token: SeDebugPrivilege 4568 gpvjaymn.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4568 gpvjaymn.exe 4568 gpvjaymn.exe 4568 gpvjaymn.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 4836 wrote to memory of 4568 4836 JaffaCakes118_57449e4ec51e0e580ea3fd9373e5b993.exe 97 PID 4836 wrote to memory of 4568 4836 JaffaCakes118_57449e4ec51e0e580ea3fd9373e5b993.exe 97 PID 4836 wrote to memory of 4568 4836 JaffaCakes118_57449e4ec51e0e580ea3fd9373e5b993.exe 97 PID 4836 wrote to memory of 4568 4836 JaffaCakes118_57449e4ec51e0e580ea3fd9373e5b993.exe 97 PID 4836 wrote to memory of 4568 4836 JaffaCakes118_57449e4ec51e0e580ea3fd9373e5b993.exe 97 PID 4836 wrote to memory of 4568 4836 JaffaCakes118_57449e4ec51e0e580ea3fd9373e5b993.exe 97 PID 4836 wrote to memory of 4568 4836 JaffaCakes118_57449e4ec51e0e580ea3fd9373e5b993.exe 97 PID 4836 wrote to memory of 4568 4836 JaffaCakes118_57449e4ec51e0e580ea3fd9373e5b993.exe 97 PID 4568 wrote to memory of 3132 4568 gpvjaymn.exe 98 PID 4568 wrote to memory of 3132 4568 gpvjaymn.exe 98 PID 4568 wrote to memory of 3132 4568 gpvjaymn.exe 98 PID 4568 wrote to memory of 3332 4568 gpvjaymn.exe 99 PID 4568 wrote to memory of 3332 4568 gpvjaymn.exe 99 PID 4568 wrote to memory of 3332 4568 gpvjaymn.exe 99 PID 4568 wrote to memory of 1048 4568 gpvjaymn.exe 101 PID 4568 wrote to memory of 1048 4568 gpvjaymn.exe 101 PID 4568 wrote to memory of 1048 4568 gpvjaymn.exe 101 PID 4568 wrote to memory of 3284 4568 gpvjaymn.exe 102 PID 4568 wrote to memory of 3284 4568 gpvjaymn.exe 102 PID 4568 wrote to memory of 3284 4568 gpvjaymn.exe 102 PID 1048 wrote to memory of 1328 1048 cmd.exe 106 PID 1048 wrote to memory of 1328 1048 cmd.exe 106 PID 1048 wrote to memory of 1328 1048 cmd.exe 106 PID 3132 wrote to memory of 4432 3132 cmd.exe 108 PID 3132 wrote to memory of 4432 3132 cmd.exe 108 PID 3132 wrote to memory of 4432 3132 cmd.exe 108 PID 3332 wrote to memory of 3652 3332 cmd.exe 107 PID 3332 wrote to memory of 3652 3332 cmd.exe 107 PID 3332 wrote to memory of 3652 3332 cmd.exe 107 PID 3284 wrote to memory of 2012 3284 cmd.exe 109 PID 3284 wrote to memory of 2012 3284 cmd.exe 109 PID 3284 wrote to memory of 2012 3284 cmd.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_57449e4ec51e0e580ea3fd9373e5b993.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_57449e4ec51e0e580ea3fd9373e5b993.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\gpvjaymn.exeC:\Users\Admin\AppData\Local\Temp\gpvjaymn.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4432
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\gpvjaymn.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\gpvjaymn.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\gpvjaymn.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\gpvjaymn.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3652
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1328
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\flash.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\flash.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\flash.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\flash.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2012
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34