Analysis
-
max time kernel
148s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2025, 17:42
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a0d28a14a108a417404a1a0085e9a911.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_a0d28a14a108a417404a1a0085e9a911.exe
-
Size
3.8MB
-
MD5
a0d28a14a108a417404a1a0085e9a911
-
SHA1
5eb823f6461e57165d1bf9548a649f2a983e3f3b
-
SHA256
0ef26e649d2ae9d837b7b400d96a2f3b1568f70642fa1659a6ce0d4492cedf86
-
SHA512
cfc8b9640cf48a138ab706df62075ad24245727a002fd9f3b01357c90e2948a769354ad5a94c4f78e48caab3646993e5c44da78b313f086eca6d369169a2a2a7
-
SSDEEP
12288:KW8zS0kzKOLH3bNso3AQhaMQRjk96dqkKZlGM4OJm+3DZC51QF4o7NNmg5dKIKO:KWeSD+OLHLNfwkEm7TmgdnT
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 15 IoCs
resource yara_rule behavioral1/memory/4676-25-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/4676-31-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/4676-32-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/4676-33-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/4676-35-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/4676-36-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/4676-37-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/4676-39-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/4676-40-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/4676-41-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/4676-44-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/4676-45-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/4676-47-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/4676-48-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/4676-49-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\FFR8BPHRKA.exe = "C:\\Users\\Admin\\AppData\\Roaming\\FFR8BPHRKA.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\GoogleApplic\GoogleApplicl.exe = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleApplic\\GoogleApplicl.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\Control Panel\International\Geo\Nation JaffaCakes118_a0d28a14a108a417404a1a0085e9a911.exe -
Executes dropped EXE 2 IoCs
pid Process 5140 GoogleApplicl.exe 4676 GoogleApplicl.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3920955164-3782810283-1225622749-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleApplic = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleApplic\\GoogleApplicl.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5140 set thread context of 4676 5140 GoogleApplicl.exe 96 -
resource yara_rule behavioral1/memory/4676-24-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/4676-25-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/4676-19-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/4676-31-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/4676-32-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/4676-33-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/4676-35-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/4676-36-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/4676-37-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/4676-39-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/4676-40-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/4676-41-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/4676-44-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/4676-45-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/4676-47-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/4676-48-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/4676-49-0x0000000000400000-0x0000000000473000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleApplicl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a0d28a14a108a417404a1a0085e9a911.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GoogleApplicl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 3968 reg.exe 5416 reg.exe 3520 reg.exe 5932 reg.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: 1 4676 GoogleApplicl.exe Token: SeCreateTokenPrivilege 4676 GoogleApplicl.exe Token: SeAssignPrimaryTokenPrivilege 4676 GoogleApplicl.exe Token: SeLockMemoryPrivilege 4676 GoogleApplicl.exe Token: SeIncreaseQuotaPrivilege 4676 GoogleApplicl.exe Token: SeMachineAccountPrivilege 4676 GoogleApplicl.exe Token: SeTcbPrivilege 4676 GoogleApplicl.exe Token: SeSecurityPrivilege 4676 GoogleApplicl.exe Token: SeTakeOwnershipPrivilege 4676 GoogleApplicl.exe Token: SeLoadDriverPrivilege 4676 GoogleApplicl.exe Token: SeSystemProfilePrivilege 4676 GoogleApplicl.exe Token: SeSystemtimePrivilege 4676 GoogleApplicl.exe Token: SeProfSingleProcessPrivilege 4676 GoogleApplicl.exe Token: SeIncBasePriorityPrivilege 4676 GoogleApplicl.exe Token: SeCreatePagefilePrivilege 4676 GoogleApplicl.exe Token: SeCreatePermanentPrivilege 4676 GoogleApplicl.exe Token: SeBackupPrivilege 4676 GoogleApplicl.exe Token: SeRestorePrivilege 4676 GoogleApplicl.exe Token: SeShutdownPrivilege 4676 GoogleApplicl.exe Token: SeDebugPrivilege 4676 GoogleApplicl.exe Token: SeAuditPrivilege 4676 GoogleApplicl.exe Token: SeSystemEnvironmentPrivilege 4676 GoogleApplicl.exe Token: SeChangeNotifyPrivilege 4676 GoogleApplicl.exe Token: SeRemoteShutdownPrivilege 4676 GoogleApplicl.exe Token: SeUndockPrivilege 4676 GoogleApplicl.exe Token: SeSyncAgentPrivilege 4676 GoogleApplicl.exe Token: SeEnableDelegationPrivilege 4676 GoogleApplicl.exe Token: SeManageVolumePrivilege 4676 GoogleApplicl.exe Token: SeImpersonatePrivilege 4676 GoogleApplicl.exe Token: SeCreateGlobalPrivilege 4676 GoogleApplicl.exe Token: 31 4676 GoogleApplicl.exe Token: 32 4676 GoogleApplicl.exe Token: 33 4676 GoogleApplicl.exe Token: 34 4676 GoogleApplicl.exe Token: 35 4676 GoogleApplicl.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 5580 JaffaCakes118_a0d28a14a108a417404a1a0085e9a911.exe 5140 GoogleApplicl.exe 4676 GoogleApplicl.exe 4676 GoogleApplicl.exe 4676 GoogleApplicl.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 5580 wrote to memory of 2752 5580 JaffaCakes118_a0d28a14a108a417404a1a0085e9a911.exe 89 PID 5580 wrote to memory of 2752 5580 JaffaCakes118_a0d28a14a108a417404a1a0085e9a911.exe 89 PID 5580 wrote to memory of 2752 5580 JaffaCakes118_a0d28a14a108a417404a1a0085e9a911.exe 89 PID 2752 wrote to memory of 4544 2752 cmd.exe 92 PID 2752 wrote to memory of 4544 2752 cmd.exe 92 PID 2752 wrote to memory of 4544 2752 cmd.exe 92 PID 5580 wrote to memory of 5140 5580 JaffaCakes118_a0d28a14a108a417404a1a0085e9a911.exe 95 PID 5580 wrote to memory of 5140 5580 JaffaCakes118_a0d28a14a108a417404a1a0085e9a911.exe 95 PID 5580 wrote to memory of 5140 5580 JaffaCakes118_a0d28a14a108a417404a1a0085e9a911.exe 95 PID 5140 wrote to memory of 4676 5140 GoogleApplicl.exe 96 PID 5140 wrote to memory of 4676 5140 GoogleApplicl.exe 96 PID 5140 wrote to memory of 4676 5140 GoogleApplicl.exe 96 PID 5140 wrote to memory of 4676 5140 GoogleApplicl.exe 96 PID 5140 wrote to memory of 4676 5140 GoogleApplicl.exe 96 PID 5140 wrote to memory of 4676 5140 GoogleApplicl.exe 96 PID 5140 wrote to memory of 4676 5140 GoogleApplicl.exe 96 PID 5140 wrote to memory of 4676 5140 GoogleApplicl.exe 96 PID 4676 wrote to memory of 4872 4676 GoogleApplicl.exe 97 PID 4676 wrote to memory of 4872 4676 GoogleApplicl.exe 97 PID 4676 wrote to memory of 4872 4676 GoogleApplicl.exe 97 PID 4676 wrote to memory of 4772 4676 GoogleApplicl.exe 98 PID 4676 wrote to memory of 4772 4676 GoogleApplicl.exe 98 PID 4676 wrote to memory of 4772 4676 GoogleApplicl.exe 98 PID 4676 wrote to memory of 4720 4676 GoogleApplicl.exe 99 PID 4676 wrote to memory of 4720 4676 GoogleApplicl.exe 99 PID 4676 wrote to memory of 4720 4676 GoogleApplicl.exe 99 PID 4676 wrote to memory of 4684 4676 GoogleApplicl.exe 101 PID 4676 wrote to memory of 4684 4676 GoogleApplicl.exe 101 PID 4676 wrote to memory of 4684 4676 GoogleApplicl.exe 101 PID 4772 wrote to memory of 5416 4772 cmd.exe 105 PID 4772 wrote to memory of 5416 4772 cmd.exe 105 PID 4772 wrote to memory of 5416 4772 cmd.exe 105 PID 4872 wrote to memory of 3968 4872 cmd.exe 106 PID 4872 wrote to memory of 3968 4872 cmd.exe 106 PID 4872 wrote to memory of 3968 4872 cmd.exe 106 PID 4720 wrote to memory of 3520 4720 cmd.exe 107 PID 4720 wrote to memory of 3520 4720 cmd.exe 107 PID 4720 wrote to memory of 3520 4720 cmd.exe 107 PID 4684 wrote to memory of 5932 4684 cmd.exe 108 PID 4684 wrote to memory of 5932 4684 cmd.exe 108 PID 4684 wrote to memory of 5932 4684 cmd.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0d28a14a108a417404a1a0085e9a911.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0d28a14a108a417404a1a0085e9a911.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\porMk.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "GoogleApplic" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\GoogleApplic\GoogleApplicl.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4544
-
-
-
C:\Users\Admin\AppData\Roaming\GoogleApplic\GoogleApplicl.exe"C:\Users\Admin\AppData\Roaming\GoogleApplic\GoogleApplicl.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5140 -
C:\Users\Admin\AppData\Roaming\GoogleApplic\GoogleApplicl.exeFalse3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3968
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\GoogleApplic\GoogleApplicl.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\GoogleApplic\GoogleApplicl.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\GoogleApplic\GoogleApplicl.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\GoogleApplic\GoogleApplicl.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5416
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3520
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\FFR8BPHRKA.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FFR8BPHRKA.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\FFR8BPHRKA.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FFR8BPHRKA.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:5932
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\GoogleApplic\GoogleApplicl.exe1⤵PID:4596
Network
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158B
MD5abaf4a9cd95209d9bf9a33e7175a9f38
SHA11623be93bbc9da45c287e863294fcb6157bfbca2
SHA256f82ac3e70883f3e2f46d6c88df4f64c508b7cc35bbe0e3cdfae50050f3dd22bf
SHA5129c06fbb29e7828d0df08183d582f3e8a1e9aa1e67a95960e0bc98e942f38d979f51af7dc35061c62a51da233fb0cbd60353a72434dcc3b5c5605bce15163a649
-
Filesize
3.8MB
MD5a0d28a14a108a417404a1a0085e9a911
SHA15eb823f6461e57165d1bf9548a649f2a983e3f3b
SHA2560ef26e649d2ae9d837b7b400d96a2f3b1568f70642fa1659a6ce0d4492cedf86
SHA512cfc8b9640cf48a138ab706df62075ad24245727a002fd9f3b01357c90e2948a769354ad5a94c4f78e48caab3646993e5c44da78b313f086eca6d369169a2a2a7