Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 08:54
Behavioral task
behavioral1
Sample
078fd014bac4a207444ec7e40d26a0c5_JaffaCakes118.pdf
Resource
win7-20240611-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
078fd014bac4a207444ec7e40d26a0c5_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
5 signatures
150 seconds
General
-
Target
078fd014bac4a207444ec7e40d26a0c5_JaffaCakes118.pdf
-
Size
7KB
-
MD5
078fd014bac4a207444ec7e40d26a0c5
-
SHA1
bc0fcbb3c8a3f6843c74a9ad45e0969d6637f96a
-
SHA256
96795779b9091b1d1af23b7e8c751945561bdab9d3e2726fefc63b8e44df5c40
-
SHA512
266fb7fe465a201bb29fb53f219f2d3ecca232b7f8b961f6787f4b8318168dde40a4d371031af0da27a31864d99d72a06b86a72847229516f0e2e514cb020640
-
SSDEEP
192:4eH18/e/nP10wcS+/kU7LMtfLY/IY6BoaRZ3SNbm+PkKrute1Wtg:4eH18/e/nPrj+/JnsQIC0Z3ebFPkKitu
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1644 2244 WerFault.exe 27 -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2244 AcroRd32.exe 2244 AcroRd32.exe 2244 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1644 2244 AcroRd32.exe 28 PID 2244 wrote to memory of 1644 2244 AcroRd32.exe 28 PID 2244 wrote to memory of 1644 2244 AcroRd32.exe 28 PID 2244 wrote to memory of 1644 2244 AcroRd32.exe 28
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\078fd014bac4a207444ec7e40d26a0c5_JaffaCakes118.pdf"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 7722⤵
- Program crash
PID:1644
-