Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12-08-2024 02:03
Behavioral task
behavioral1
Sample
8ce21926b4c17f2beb7d582c1bccda6f_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8ce21926b4c17f2beb7d582c1bccda6f_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
8ce21926b4c17f2beb7d582c1bccda6f_JaffaCakes118.pdf
-
Size
11KB
-
MD5
8ce21926b4c17f2beb7d582c1bccda6f
-
SHA1
7b689a18827c04afe89f72788a29e0bc6f130114
-
SHA256
f220155024b0a8cee2a78660a6d6a6590ca5bbabe8bf9f68b168366863006c5a
-
SHA512
ce231e1934e864640dc9a8e624f8635ae2c15383f6e9afbd91e2e7afa1ab478979bcfe56da6290e8fac57b8642345760c9362839f5f8620d71175b744a58cd3c
-
SSDEEP
192:bONbedw+lJ5GFTPZyzRbR0/G8R/TgTR4Urz53:bONbedw+lJ5G9PUtqG8R7+4W53
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2216 2296 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2296 AcroRd32.exe 2296 AcroRd32.exe 2296 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2216 2296 AcroRd32.exe 29 PID 2296 wrote to memory of 2216 2296 AcroRd32.exe 29 PID 2296 wrote to memory of 2216 2296 AcroRd32.exe 29 PID 2296 wrote to memory of 2216 2296 AcroRd32.exe 29
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\8ce21926b4c17f2beb7d582c1bccda6f_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 7562⤵
- Program crash
PID:2216
-