Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2025, 08:06
Behavioral task
behavioral1
Sample
JaffaCakes118_64248c7195c6f3b0fe05b3b018799d11.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_64248c7195c6f3b0fe05b3b018799d11.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_64248c7195c6f3b0fe05b3b018799d11.exe
-
Size
456KB
-
MD5
64248c7195c6f3b0fe05b3b018799d11
-
SHA1
2e9f99a936823b13f4d4aaab5dd282e83480f988
-
SHA256
df22f6fee1722b4e016394f45c745948ac3622973fb5662f74f7d7bf6287942f
-
SHA512
462ada83611f85cc06c80930e206bad1efd6be80aaa750c946c08e8a4b1e23567a062f3faa02c653dd366eec62111975f23d37741ab7fad7572d2bfb34d1cb67
-
SSDEEP
12288:qqy6m/BCfGKEQA0cUH2VMCAlMl8Ynnnul7u5GDh9OLJDyiLBHnnnHpEJNOfEDhNf:C6m/BCfGKEQA0cUH2VMCAlrYnnnul7u0
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 15 IoCs
resource yara_rule behavioral2/memory/3544-6-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3544-11-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3544-18-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3544-19-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3544-20-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3544-22-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3544-23-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3544-25-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3544-26-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3544-27-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3544-29-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3544-30-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3544-31-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3544-32-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3544-35-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\WinDefender.exe = "C:\\Users\\Admin\\AppData\\Roaming\\WinDefender.exe:*:Enabled:Windows Messanger" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\a1ntjxp1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a1ntjxp1.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Executes dropped EXE 1 IoCs
pid Process 3544 a1ntjxp1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2000 set thread context of 3544 2000 JaffaCakes118_64248c7195c6f3b0fe05b3b018799d11.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_64248c7195c6f3b0fe05b3b018799d11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1ntjxp1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 3900 reg.exe 1128 reg.exe 1928 reg.exe 4436 reg.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: 1 3544 a1ntjxp1.exe Token: SeCreateTokenPrivilege 3544 a1ntjxp1.exe Token: SeAssignPrimaryTokenPrivilege 3544 a1ntjxp1.exe Token: SeLockMemoryPrivilege 3544 a1ntjxp1.exe Token: SeIncreaseQuotaPrivilege 3544 a1ntjxp1.exe Token: SeMachineAccountPrivilege 3544 a1ntjxp1.exe Token: SeTcbPrivilege 3544 a1ntjxp1.exe Token: SeSecurityPrivilege 3544 a1ntjxp1.exe Token: SeTakeOwnershipPrivilege 3544 a1ntjxp1.exe Token: SeLoadDriverPrivilege 3544 a1ntjxp1.exe Token: SeSystemProfilePrivilege 3544 a1ntjxp1.exe Token: SeSystemtimePrivilege 3544 a1ntjxp1.exe Token: SeProfSingleProcessPrivilege 3544 a1ntjxp1.exe Token: SeIncBasePriorityPrivilege 3544 a1ntjxp1.exe Token: SeCreatePagefilePrivilege 3544 a1ntjxp1.exe Token: SeCreatePermanentPrivilege 3544 a1ntjxp1.exe Token: SeBackupPrivilege 3544 a1ntjxp1.exe Token: SeRestorePrivilege 3544 a1ntjxp1.exe Token: SeShutdownPrivilege 3544 a1ntjxp1.exe Token: SeDebugPrivilege 3544 a1ntjxp1.exe Token: SeAuditPrivilege 3544 a1ntjxp1.exe Token: SeSystemEnvironmentPrivilege 3544 a1ntjxp1.exe Token: SeChangeNotifyPrivilege 3544 a1ntjxp1.exe Token: SeRemoteShutdownPrivilege 3544 a1ntjxp1.exe Token: SeUndockPrivilege 3544 a1ntjxp1.exe Token: SeSyncAgentPrivilege 3544 a1ntjxp1.exe Token: SeEnableDelegationPrivilege 3544 a1ntjxp1.exe Token: SeManageVolumePrivilege 3544 a1ntjxp1.exe Token: SeImpersonatePrivilege 3544 a1ntjxp1.exe Token: SeCreateGlobalPrivilege 3544 a1ntjxp1.exe Token: 31 3544 a1ntjxp1.exe Token: 32 3544 a1ntjxp1.exe Token: 33 3544 a1ntjxp1.exe Token: 34 3544 a1ntjxp1.exe Token: 35 3544 a1ntjxp1.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3544 a1ntjxp1.exe 3544 a1ntjxp1.exe 3544 a1ntjxp1.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2000 wrote to memory of 3544 2000 JaffaCakes118_64248c7195c6f3b0fe05b3b018799d11.exe 90 PID 2000 wrote to memory of 3544 2000 JaffaCakes118_64248c7195c6f3b0fe05b3b018799d11.exe 90 PID 2000 wrote to memory of 3544 2000 JaffaCakes118_64248c7195c6f3b0fe05b3b018799d11.exe 90 PID 2000 wrote to memory of 3544 2000 JaffaCakes118_64248c7195c6f3b0fe05b3b018799d11.exe 90 PID 2000 wrote to memory of 3544 2000 JaffaCakes118_64248c7195c6f3b0fe05b3b018799d11.exe 90 PID 2000 wrote to memory of 3544 2000 JaffaCakes118_64248c7195c6f3b0fe05b3b018799d11.exe 90 PID 2000 wrote to memory of 3544 2000 JaffaCakes118_64248c7195c6f3b0fe05b3b018799d11.exe 90 PID 2000 wrote to memory of 3544 2000 JaffaCakes118_64248c7195c6f3b0fe05b3b018799d11.exe 90 PID 3544 wrote to memory of 1728 3544 a1ntjxp1.exe 93 PID 3544 wrote to memory of 1728 3544 a1ntjxp1.exe 93 PID 3544 wrote to memory of 1728 3544 a1ntjxp1.exe 93 PID 3544 wrote to memory of 4520 3544 a1ntjxp1.exe 94 PID 3544 wrote to memory of 4520 3544 a1ntjxp1.exe 94 PID 3544 wrote to memory of 4520 3544 a1ntjxp1.exe 94 PID 3544 wrote to memory of 3264 3544 a1ntjxp1.exe 96 PID 3544 wrote to memory of 3264 3544 a1ntjxp1.exe 96 PID 3544 wrote to memory of 3264 3544 a1ntjxp1.exe 96 PID 3544 wrote to memory of 5100 3544 a1ntjxp1.exe 98 PID 3544 wrote to memory of 5100 3544 a1ntjxp1.exe 98 PID 3544 wrote to memory of 5100 3544 a1ntjxp1.exe 98 PID 1728 wrote to memory of 3900 1728 cmd.exe 101 PID 1728 wrote to memory of 3900 1728 cmd.exe 101 PID 1728 wrote to memory of 3900 1728 cmd.exe 101 PID 4520 wrote to memory of 1128 4520 cmd.exe 102 PID 4520 wrote to memory of 1128 4520 cmd.exe 102 PID 4520 wrote to memory of 1128 4520 cmd.exe 102 PID 5100 wrote to memory of 1928 5100 cmd.exe 103 PID 5100 wrote to memory of 1928 5100 cmd.exe 103 PID 5100 wrote to memory of 1928 5100 cmd.exe 103 PID 3264 wrote to memory of 4436 3264 cmd.exe 104 PID 3264 wrote to memory of 4436 3264 cmd.exe 104 PID 3264 wrote to memory of 4436 3264 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_64248c7195c6f3b0fe05b3b018799d11.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_64248c7195c6f3b0fe05b3b018799d11.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\a1ntjxp1.exeC:\Users\Admin\AppData\Local\Temp\a1ntjxp1.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3900
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\a1ntjxp1.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\a1ntjxp1.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\a1ntjxp1.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\a1ntjxp1.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1128
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4436
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\WinDefender.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WinDefender.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\WinDefender.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WinDefender.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1928
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5d881de17aa8f2e2c08cbb7b265f928f9
SHA108936aebc87decf0af6e8eada191062b5e65ac2a
SHA256b3a37093609f9a20ad60b85a9fa9de2ba674cba9b5bd687729440c70ba619ca0
SHA5125f23bfb1b8740247b36ed0ab741738c7d4c949736129e767213e321607d1ccd3e3a8428e4ba44bd28a275b5e3f6206285b1a522514b7ef7ea5e698d90a713d34