Analysis

  • max time kernel
    15s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 06:47

General

  • Target

    eaca05c153ff24184754e3a1b0591b25_JaffaCakes118.pdf

  • Size

    11KB

  • MD5

    eaca05c153ff24184754e3a1b0591b25

  • SHA1

    96b43d644c320892eb51c9fb29abaaa7d280b69b

  • SHA256

    6d9df4990e9ccab9d5704e4023e421eadd9dc1a210cb0e4a627d91d97688548a

  • SHA512

    d7d00c2fe5ed54fb8d05984e4a1c06b3612be7f380bceb59ee7efc6d38c08ec9111df5b0d92ad9ad8f10c6c4076cdbaaa65f01ddfa84eaa316d54dd47751481e

  • SSDEEP

    192:bONbedw+lJ5I1VHE0ZRHsvUAEBcItG0bgDLOSrfkL2Vkmmmmmmmmmmmmmmmm523b:bONbedw+lJ5qAEBcIwFLOSrfkRmmmmmZ

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\eaca05c153ff24184754e3a1b0591b25_JaffaCakes118.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:984
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 984 -s 760
      2⤵
      • Program crash
      PID:2016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/984-0-0x0000000001180000-0x00000000011F6000-memory.dmp

    Filesize

    472KB