Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 20:37
Behavioral task
behavioral1
Sample
5d926a902facb3c0bfc27e764a493917_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5d926a902facb3c0bfc27e764a493917_JaffaCakes118.pdf
Resource
win10v2004-20240709-en
General
-
Target
5d926a902facb3c0bfc27e764a493917_JaffaCakes118.pdf
-
Size
575KB
-
MD5
5d926a902facb3c0bfc27e764a493917
-
SHA1
fd2420a24b037fea318df7260aae9a73e41329d0
-
SHA256
171d3066221549aafb1a19ddd4af5bd827f60a8746801cfe82aa65c0697a1c4c
-
SHA512
ace34bca1e4ad2ff701733dc4855fa7182ca12cdf35c64e192beeeca99705fcbf5c33a783a7a96a303bb315b49a01920f6170aa3fa7cad2b5b6ea58d277e05b8
-
SSDEEP
12288:62qwr76LJxiASmhKeFDBrFJEG+9mhvyCeHT2UrSSp1jbKpLkuoR:64fyqASmAKvEG+vVSvoO4PR
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process 2864 2180 WerFault.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2864 2180 AcroRd32.exe 30 PID 2180 wrote to memory of 2864 2180 AcroRd32.exe 30 PID 2180 wrote to memory of 2864 2180 AcroRd32.exe 30 PID 2180 wrote to memory of 2864 2180 AcroRd32.exe 30
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\5d926a902facb3c0bfc27e764a493917_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 10762⤵
- Program crash
PID:2864
-