Analysis

  • max time kernel
    148s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/04/2025, 17:42

General

  • Target

    JaffaCakes118_a0d28a14a108a417404a1a0085e9a911.exe

  • Size

    3.8MB

  • MD5

    a0d28a14a108a417404a1a0085e9a911

  • SHA1

    5eb823f6461e57165d1bf9548a649f2a983e3f3b

  • SHA256

    0ef26e649d2ae9d837b7b400d96a2f3b1568f70642fa1659a6ce0d4492cedf86

  • SHA512

    cfc8b9640cf48a138ab706df62075ad24245727a002fd9f3b01357c90e2948a769354ad5a94c4f78e48caab3646993e5c44da78b313f086eca6d369169a2a2a7

  • SSDEEP

    12288:KW8zS0kzKOLH3bNso3AQhaMQRjk96dqkKZlGM4OJm+3DZC51QF4o7NNmg5dKIKO:KWeSD+OLHLNfwkEm7TmgdnT

Malware Config

Signatures

  • Blackshades

    Blackshades is a remote access trojan with various capabilities.

  • Blackshades family
  • Blackshades payload 15 IoCs
  • Modifies firewall policy service 3 TTPs 10 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0d28a14a108a417404a1a0085e9a911.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a0d28a14a108a417404a1a0085e9a911.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5580
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\porMk.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "GoogleApplic" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\GoogleApplic\GoogleApplicl.exe" /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4544
    • C:\Users\Admin\AppData\Roaming\GoogleApplic\GoogleApplicl.exe
      "C:\Users\Admin\AppData\Roaming\GoogleApplic\GoogleApplicl.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5140
      • C:\Users\Admin\AppData\Roaming\GoogleApplic\GoogleApplicl.exe
        False
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4676
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4872
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:3968
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\GoogleApplic\GoogleApplicl.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\GoogleApplic\GoogleApplicl.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4772
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\GoogleApplic\GoogleApplicl.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\GoogleApplic\GoogleApplicl.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:5416
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4720
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:3520
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\FFR8BPHRKA.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FFR8BPHRKA.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4684
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\FFR8BPHRKA.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FFR8BPHRKA.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:5932
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\GoogleApplic\GoogleApplicl.exe
    1⤵
      PID:4596

    Network

    MITRE ATT&CK Enterprise v16

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\porMk.bat

      Filesize

      158B

      MD5

      abaf4a9cd95209d9bf9a33e7175a9f38

      SHA1

      1623be93bbc9da45c287e863294fcb6157bfbca2

      SHA256

      f82ac3e70883f3e2f46d6c88df4f64c508b7cc35bbe0e3cdfae50050f3dd22bf

      SHA512

      9c06fbb29e7828d0df08183d582f3e8a1e9aa1e67a95960e0bc98e942f38d979f51af7dc35061c62a51da233fb0cbd60353a72434dcc3b5c5605bce15163a649

    • C:\Users\Admin\AppData\Roaming\GoogleApplic\GoogleApplicl.exe

      Filesize

      3.8MB

      MD5

      a0d28a14a108a417404a1a0085e9a911

      SHA1

      5eb823f6461e57165d1bf9548a649f2a983e3f3b

      SHA256

      0ef26e649d2ae9d837b7b400d96a2f3b1568f70642fa1659a6ce0d4492cedf86

      SHA512

      cfc8b9640cf48a138ab706df62075ad24245727a002fd9f3b01357c90e2948a769354ad5a94c4f78e48caab3646993e5c44da78b313f086eca6d369169a2a2a7

    • memory/4676-24-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/4676-25-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/4676-19-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/4676-31-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/4676-32-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/4676-33-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/4676-35-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/4676-36-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/4676-37-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/4676-39-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/4676-40-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/4676-41-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/4676-44-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/4676-45-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/4676-47-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/4676-48-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB

    • memory/4676-49-0x0000000000400000-0x0000000000473000-memory.dmp

      Filesize

      460KB