Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:40
Behavioral task
behavioral1
Sample
eab03cae2b2fba8209f93cb2aaf08cfd_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eab03cae2b2fba8209f93cb2aaf08cfd_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
eab03cae2b2fba8209f93cb2aaf08cfd_JaffaCakes118.pdf
-
Size
105KB
-
MD5
eab03cae2b2fba8209f93cb2aaf08cfd
-
SHA1
68d5288192efaac409cc7581737d03e1e77bf991
-
SHA256
8ad54161eee90a0975d1b92a12d8d501170d5e29d29a5adcc4983ff0a23aa8b3
-
SHA512
de6b53e6f3d8d61db271014c0a47800d4e4a3ccf594b4a5f656942a98966009373333cc29924ae402dc9a2400ce16f9c11362a37be0f3ec251443ac460989698
-
SSDEEP
96:bON06mxdw+B/J57nfEKFQJjr/yGveRo5x5T5G5yuvhDXdS5c93KFmmgL57FrhqrA:bONbedw+lJ57NPCOywrU5BkZ3
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2320 1972 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1972 AcroRd32.exe 1972 AcroRd32.exe 1972 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2320 1972 AcroRd32.exe 30 PID 1972 wrote to memory of 2320 1972 AcroRd32.exe 30 PID 1972 wrote to memory of 2320 1972 AcroRd32.exe 30 PID 1972 wrote to memory of 2320 1972 AcroRd32.exe 30
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\eab03cae2b2fba8209f93cb2aaf08cfd_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 7602⤵
- Program crash
PID:2320
-