Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 17:27
Behavioral task
behavioral1
Sample
d4e346ffb18c8ee5a15f8c1f24a86ebb_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d4e346ffb18c8ee5a15f8c1f24a86ebb_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
d4e346ffb18c8ee5a15f8c1f24a86ebb_JaffaCakes118.pdf
-
Size
106KB
-
MD5
d4e346ffb18c8ee5a15f8c1f24a86ebb
-
SHA1
7d9a6534d340e5394a2e4dd64a99219bc7af4fbf
-
SHA256
2c8581089a739291c232024dce8336cf4f8f21ee48348750606469e93a51a1c1
-
SHA512
162ba21ae8814c97f889680abb88a089719b6c9d48f2470c3e2c8f9be75f86de9c341f9c009d39cb72b3aac68083addaa14f590f5130142543b14cd0c017a500
-
SSDEEP
384:bONbedw+lJ5QUgmNfmemgmmm6XqxBp4mp3mz0H1QvU8nmw+1Vy+YY5mGJVamoa2T:r
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2280 2180 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2180 AcroRd32.exe 2180 AcroRd32.exe 2180 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2280 2180 AcroRd32.exe 30 PID 2180 wrote to memory of 2280 2180 AcroRd32.exe 30 PID 2180 wrote to memory of 2280 2180 AcroRd32.exe 30 PID 2180 wrote to memory of 2280 2180 AcroRd32.exe 30
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d4e346ffb18c8ee5a15f8c1f24a86ebb_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 7522⤵
- Program crash
PID:2280
-