Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 21:53
Behavioral task
behavioral1
Sample
b53083a6d24a766fdc171ebb11a9ff6e_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b53083a6d24a766fdc171ebb11a9ff6e_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
b53083a6d24a766fdc171ebb11a9ff6e_JaffaCakes118.pdf
-
Size
20KB
-
MD5
b53083a6d24a766fdc171ebb11a9ff6e
-
SHA1
e936922226d518190436091809862f5daf6614fe
-
SHA256
1580ac1359543535fea7a1ab133f94ebf314f178df7cd5e30524ec0e646b9ee4
-
SHA512
747f9a22034c0eedcce2c41f6a57de89c00831f44293110a520b1732778eb8bee3187cb8564836b466cf8a4bd2ec6fa41236d0b70fcb3d3d902374e110d487d4
-
SSDEEP
384:xcWZX3JqOxooAKD2gNnfKKDyesg+tuITCnGQh6SGy4Kuh9UH4b1CZH2L0E6G+hyw:WaVjRpDyeLudFaZq6IcZHhEK
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1660 3052 WerFault.exe 27 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3052 AcroRd32.exe 3052 AcroRd32.exe 3052 AcroRd32.exe 3052 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 1660 3052 AcroRd32.exe 28 PID 3052 wrote to memory of 1660 3052 AcroRd32.exe 28 PID 3052 wrote to memory of 1660 3052 AcroRd32.exe 28 PID 3052 wrote to memory of 1660 3052 AcroRd32.exe 28
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\b53083a6d24a766fdc171ebb11a9ff6e_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 7842⤵
- Program crash
PID:1660
-