Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2025, 02:04

General

  • Target

    JaffaCakes118_6298a152c6181a7d3a0ad5e4eff01e2f.exe

  • Size

    4.3MB

  • MD5

    6298a152c6181a7d3a0ad5e4eff01e2f

  • SHA1

    e38bfcab531a2a6ac8c27ceda42a31db6e984dd5

  • SHA256

    f5eee0d3720ede3b730db419f35d66db1c8b58c412fe036057268c0d9ea0dd46

  • SHA512

    b22f14a064c999279888fd6b5710dedeef0194ef7cec61af765bdcdc09bcf3ca684e9fecb871c38b43af2a1afbcf036001cfffe1f1c9cc72b55c9e2b672ed06f

  • SSDEEP

    49152:mVsW61NqFAVsW6uVsW61NqnNqajr5TP72pJt1BQeHqqnogEzszcENpYSLu6s2rw9:mVsW61NqFAVsW6uVsW61NqnNqajD

Malware Config

Signatures

  • Blackshades

    Blackshades is a remote access trojan with various capabilities.

  • Blackshades family
  • Blackshades payload 11 IoCs
  • Modifies firewall policy service 3 TTPs 10 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6298a152c6181a7d3a0ad5e4eff01e2f.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6298a152c6181a7d3a0ad5e4eff01e2f.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1076
    • C:\Program Files\Java\jre-1.8\bin\javaw.exe
      "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\RSBuddy.jar"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:392
      • C:\Program Files\Java\jre-1.8\bin\javaw.exe
        javaw -Xmx512m -Dsun.java2d.d3d=false -classpath "/C:/Users/Admin/AppData/Local/Temp/RSBuddy.jar" com.rsbuddy.RSBuddy
        3⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3044
    • C:\Users\Admin\AppData\Local\Temp\Server2.exe
      "C:\Users\Admin\AppData\Local\Temp\Server2.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3436
      • C:\Users\Admin\AppData\Local\Temp\Server2.exe
        "C:\Users\Admin\AppData\Local\Temp\Server2.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1176
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4364
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:2728
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\Server2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\Server2.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3512
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\Server2.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\Server2.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:2744
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2556
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:2008
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3804
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RSBuddy.jar

    Filesize

    2.5MB

    MD5

    491cc3d00f1e75ebd7f45311c85e5ec9

    SHA1

    3fe7fea9e8b59a14f4742cb0b2015e8d79d96535

    SHA256

    f4be4b34d5967c4a27c59bc6be56e515fc7c94f87a749731f3249e78fa068a51

    SHA512

    984b6d3d1eb26375582368bfdacb85a8ba4ba325c56e9c19ed7bc156e00889a1bdc48b34660492917794dd00c7e7174f36d3c5901be8dd733065b4ccff8dde29

  • C:\Users\Admin\AppData\Local\Temp\Server2.exe

    Filesize

    483KB

    MD5

    7db37b4ce12510e4abd0a6ff5497e2ca

    SHA1

    66266955b7085c082cde71959d3eeb5f23438e46

    SHA256

    80b22edd7e306eafa5a745c424b0be7d2213a31574fcf635640a74cde6823d83

    SHA512

    68201a7e5a72c3ac4ead69989bbe9adc1fc3f5c31b0411a8f95150f175f8c8f12abe2ffa5e0830b58615c34303f45eb0537b0eadfdc5a4148fd3a5bfb00153ac

  • memory/392-49-0x00000235BD620000-0x00000235BD621000-memory.dmp

    Filesize

    4KB

  • memory/392-50-0x00000235BF030000-0x00000235BF2A0000-memory.dmp

    Filesize

    2.4MB

  • memory/392-26-0x00000235BF030000-0x00000235BF2A0000-memory.dmp

    Filesize

    2.4MB

  • memory/1076-8-0x00007FF9D7920000-0x00007FF9D82C1000-memory.dmp

    Filesize

    9.6MB

  • memory/1076-2-0x00007FF9D7920000-0x00007FF9D82C1000-memory.dmp

    Filesize

    9.6MB

  • memory/1076-0-0x00007FF9D7BD5000-0x00007FF9D7BD6000-memory.dmp

    Filesize

    4KB

  • memory/1076-7-0x000000001C580000-0x000000001C5CC000-memory.dmp

    Filesize

    304KB

  • memory/1076-27-0x00007FF9D7920000-0x00007FF9D82C1000-memory.dmp

    Filesize

    9.6MB

  • memory/1076-5-0x000000001C470000-0x000000001C50C000-memory.dmp

    Filesize

    624KB

  • memory/1076-6-0x0000000001050000-0x0000000001058000-memory.dmp

    Filesize

    32KB

  • memory/1076-1-0x000000001B8E0000-0x000000001B986000-memory.dmp

    Filesize

    664KB

  • memory/1076-4-0x00007FF9D7920000-0x00007FF9D82C1000-memory.dmp

    Filesize

    9.6MB

  • memory/1076-3-0x000000001BFA0000-0x000000001C46E000-memory.dmp

    Filesize

    4.8MB

  • memory/1176-171-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1176-145-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1176-35-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1176-33-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1176-165-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1176-178-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1176-161-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1176-152-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1176-120-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1176-180-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/1176-136-0x0000000000400000-0x0000000000470000-memory.dmp

    Filesize

    448KB

  • memory/3044-121-0x0000015027620000-0x0000015027621000-memory.dmp

    Filesize

    4KB

  • memory/3044-112-0x0000015027620000-0x0000015027621000-memory.dmp

    Filesize

    4KB

  • memory/3044-103-0x0000015027620000-0x0000015027621000-memory.dmp

    Filesize

    4KB

  • memory/3044-78-0x0000015027620000-0x0000015027621000-memory.dmp

    Filesize

    4KB

  • memory/3044-67-0x0000015027620000-0x0000015027621000-memory.dmp

    Filesize

    4KB

  • memory/3436-38-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/3436-22-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB