Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 11:57
Behavioral task
behavioral1
Sample
78244078f08cd9fdee49488de2580831_JaffaCakes118.pdf
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
78244078f08cd9fdee49488de2580831_JaffaCakes118.pdf
Resource
win10v2004-20240709-en
General
-
Target
78244078f08cd9fdee49488de2580831_JaffaCakes118.pdf
-
Size
132KB
-
MD5
78244078f08cd9fdee49488de2580831
-
SHA1
dda85baa289ecfeca3993f555b5d715bc3d45bcb
-
SHA256
3362e501043c348ab0590107542b6b195f8c56bac3c1c52ad4fff20db0501097
-
SHA512
a8d67ebcbfd3486eb59b288181c19c9d76e6d1e2c9206e4ab04a6b9be49273ef9eb9e637b99b63a30aafffd6343fc01ad0da4214176501e039f3ba93a328314a
-
SSDEEP
192:bONbedw+lJ5HAhKTfbJUIKRbq4vdJV4FVR5LTJzRbpu+xqn43Aa2A6YmF7Fbk5ar:bONbedw+lJ5Lwnnjdz6YPYKYk3
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3068 1948 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1948 AcroRd32.exe 1948 AcroRd32.exe 1948 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 3068 1948 AcroRd32.exe 31 PID 1948 wrote to memory of 3068 1948 AcroRd32.exe 31 PID 1948 wrote to memory of 3068 1948 AcroRd32.exe 31 PID 1948 wrote to memory of 3068 1948 AcroRd32.exe 31
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\78244078f08cd9fdee49488de2580831_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 7522⤵
- Program crash
PID:3068
-