Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 06:33
Behavioral task
behavioral1
Sample
895b3b3d1a2193eff4b2c7c4f512d21d_JaffaCakes118.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
895b3b3d1a2193eff4b2c7c4f512d21d_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
895b3b3d1a2193eff4b2c7c4f512d21d_JaffaCakes118.pdf
-
Size
87KB
-
MD5
895b3b3d1a2193eff4b2c7c4f512d21d
-
SHA1
af0ef4a2a86bee24d1be3732d29d5366e6adc215
-
SHA256
492735229f3f3e0cd6f458c30881802d4e585691a450a7d22390972ff91f5483
-
SHA512
970e97b662c00341e0f1cd1fa6c9b3e14ab37774a0d0cb81b2e79a95b5982eb99ea746235f1e94758d6dbdfe0021454d13828e09cf08de2eddd3819190762c5c
-
SSDEEP
384:bONbedw+lJ5sQ9PpSzwM1aChDXtncKvC5NpDlKKa0cRVpBVDEbzIQlDD9c9fN/56:b
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2580 2184 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2184 AcroRd32.exe 2184 AcroRd32.exe 2184 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2580 2184 AcroRd32.exe 30 PID 2184 wrote to memory of 2580 2184 AcroRd32.exe 30 PID 2184 wrote to memory of 2580 2184 AcroRd32.exe 30 PID 2184 wrote to memory of 2580 2184 AcroRd32.exe 30
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\895b3b3d1a2193eff4b2c7c4f512d21d_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 7482⤵
- Program crash
PID:2580
-