Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:19
Behavioral task
behavioral1
Sample
eabf856abac1893d8fb62153dfed8c43_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabf856abac1893d8fb62153dfed8c43_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
eabf856abac1893d8fb62153dfed8c43_JaffaCakes118.pdf
-
Size
11KB
-
MD5
eabf856abac1893d8fb62153dfed8c43
-
SHA1
9797d35fcc64a1f5c83575f30d28048d5cd388a7
-
SHA256
7f5c8d7a625a252fb69c85303ddac5ebc9e8be59f99fc373efd4d724661de454
-
SHA512
9b0c393418ce8e62ad5e4801c5476d3a99ee2fd1b26b622429e7d86e2230041e0022143b79a1fae0514b853ccbd5e1e580a42e1c1fc1dd1e0d3a6d9d73a10cff
-
SSDEEP
192:bONbedw+lJ5R3QYejRWxmoAYdAkzqEzCkOZ4gZuO5TbbG3:bONbedw+lJ5RNiFVYvz1QKCG3
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2524 1744 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1744 AcroRd32.exe 1744 AcroRd32.exe 1744 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2524 1744 AcroRd32.exe 30 PID 1744 wrote to memory of 2524 1744 AcroRd32.exe 30 PID 1744 wrote to memory of 2524 1744 AcroRd32.exe 30 PID 1744 wrote to memory of 2524 1744 AcroRd32.exe 30
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\eabf856abac1893d8fb62153dfed8c43_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 7602⤵
- Program crash
PID:2524
-