Analysis

  • max time kernel
    147s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/03/2025, 19:48

General

  • Target

    JaffaCakes118_95e393850141a36a4a81d90d35ca8eeb.exe

  • Size

    548KB

  • MD5

    95e393850141a36a4a81d90d35ca8eeb

  • SHA1

    2cd9e5b2c91c24ae779cd5105e8a88c5fd862ccc

  • SHA256

    12e9b449da927d4a38027ba18a34a8631db397734ebf7d7631ab58bef23e54e7

  • SHA512

    891161fee44dba1b1b1b8a4c5d7f5f984d0c00bf6f8f8746f9b64dcaecdd34f20fc7a97a035367eba7c44c7f15698cad4fb7b1932bc040a237e880d32c68206c

  • SSDEEP

    12288:4lFoUFZg4Vhu54005v/vDMyUIfd9HFzw9UUnEdmMLRYrQd:4lFVjg4VU4n3D3UIfEn

Malware Config

Signatures

  • Blackshades

    Blackshades is a remote access trojan with various capabilities.

  • Blackshades family
  • Blackshades payload 10 IoCs
  • Modifies firewall policy service 3 TTPs 10 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95e393850141a36a4a81d90d35ca8eeb.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95e393850141a36a4a81d90d35ca8eeb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:6016
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4792
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:4800
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4952
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /t REG_SZ /d "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:5460
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5888
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:4852
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\bot.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\bot.exe:*:Enabled:Windows Messanger" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5884
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\bot.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\bot.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • Modifies firewall policy service
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:4804
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2552
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\ProgramData\svchost.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3644
    • C:\ProgramData\svchost.exe
      C:\ProgramData\svchost.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1544
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:5308
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\svchost.exe

    Filesize

    548KB

    MD5

    95e393850141a36a4a81d90d35ca8eeb

    SHA1

    2cd9e5b2c91c24ae779cd5105e8a88c5fd862ccc

    SHA256

    12e9b449da927d4a38027ba18a34a8631db397734ebf7d7631ab58bef23e54e7

    SHA512

    891161fee44dba1b1b1b8a4c5d7f5f984d0c00bf6f8f8746f9b64dcaecdd34f20fc7a97a035367eba7c44c7f15698cad4fb7b1932bc040a237e880d32c68206c

  • memory/1544-34-0x00000000745A0000-0x0000000074B51000-memory.dmp

    Filesize

    5.7MB

  • memory/1544-23-0x00000000745A2000-0x00000000745A3000-memory.dmp

    Filesize

    4KB

  • memory/1544-24-0x00000000745A0000-0x0000000074B51000-memory.dmp

    Filesize

    5.7MB

  • memory/1920-40-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/1920-42-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/1920-108-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/1920-19-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/1920-103-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/1920-5-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/1920-3-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/1920-58-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/1920-53-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/2552-41-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2552-14-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2552-12-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/3736-46-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/5308-37-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/5308-36-0x0000000000460000-0x0000000000529000-memory.dmp

    Filesize

    804KB

  • memory/6016-0-0x0000000075242000-0x0000000075243000-memory.dmp

    Filesize

    4KB

  • memory/6016-1-0x0000000075240000-0x00000000757F1000-memory.dmp

    Filesize

    5.7MB

  • memory/6016-2-0x0000000075240000-0x00000000757F1000-memory.dmp

    Filesize

    5.7MB

  • memory/6016-18-0x0000000075240000-0x00000000757F1000-memory.dmp

    Filesize

    5.7MB