Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 16:20
Behavioral task
behavioral1
Sample
78c4b3f4428ca85c94ef702f28c26a81_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
78c4b3f4428ca85c94ef702f28c26a81_JaffaCakes118.pdf
Resource
win10v2004-20240709-en
General
-
Target
78c4b3f4428ca85c94ef702f28c26a81_JaffaCakes118.pdf
-
Size
12KB
-
MD5
78c4b3f4428ca85c94ef702f28c26a81
-
SHA1
be112c6e936a7d4d5729b7121bb4efa0d7d9ff26
-
SHA256
5e561506d47044fdd9d3469512dc97ad995213d60789609641183f62b8b46aec
-
SHA512
cf536d003d3cc5a48f7d40dd29c6e8ac53968f1ef4b24390a925b861641bd7c56cdba74bb10eb3a5bd1e64cee45f0f245ab6995cbae3787e0eee8ccbda9552ab
-
SSDEEP
192:bONbedw+lJ5R9kCbO+svMSXa5sZT1OoSjBiiiHi7zT1OoSBvZ6D//3:bONbedw+lJ5RnO7xXZZ7Sxzme/3
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2768 2072 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2072 AcroRd32.exe 2072 AcroRd32.exe 2072 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2768 2072 AcroRd32.exe 30 PID 2072 wrote to memory of 2768 2072 AcroRd32.exe 30 PID 2072 wrote to memory of 2768 2072 AcroRd32.exe 30 PID 2072 wrote to memory of 2768 2072 AcroRd32.exe 30
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\78c4b3f4428ca85c94ef702f28c26a81_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 7642⤵
- Program crash
PID:2768
-