Analysis
-
max time kernel
84s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 07:54
Behavioral task
behavioral1
Sample
d3e42f509105a5ee26efb92396de7ac7_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3e42f509105a5ee26efb92396de7ac7_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
d3e42f509105a5ee26efb92396de7ac7_JaffaCakes118.pdf
-
Size
12KB
-
MD5
d3e42f509105a5ee26efb92396de7ac7
-
SHA1
fcd2fb60041e2288063844296996a8dee3f6ed73
-
SHA256
b507c776c8caf2bea8766c64cc290f1eaf9ffcc24d94e1d2dad928791ddd02c3
-
SHA512
d88f2261caab6a71d63d43e3647b390881ef49f9e7e73d274cf5c27ec660d8087ebcda0e939a3447660d177a4850e60b49bdd879b64b1698606366582b2e18c3
-
SSDEEP
384:bONbedw+lJ5aagg6KZvbfpRhvFAxCM87WmmmmmmmmmmmmmmmmmmmmmmImmQFd3:Uagg6KtRRhvFAxVeeF9
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3044 2372 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2372 AcroRd32.exe 2372 AcroRd32.exe 2372 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 3044 2372 AcroRd32.exe 29 PID 2372 wrote to memory of 3044 2372 AcroRd32.exe 29 PID 2372 wrote to memory of 3044 2372 AcroRd32.exe 29 PID 2372 wrote to memory of 3044 2372 AcroRd32.exe 29
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d3e42f509105a5ee26efb92396de7ac7_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 7642⤵
- Program crash
PID:3044
-