Analysis
-
max time kernel
15s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:47
Behavioral task
behavioral1
Sample
eaca05c153ff24184754e3a1b0591b25_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaca05c153ff24184754e3a1b0591b25_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
eaca05c153ff24184754e3a1b0591b25_JaffaCakes118.pdf
-
Size
11KB
-
MD5
eaca05c153ff24184754e3a1b0591b25
-
SHA1
96b43d644c320892eb51c9fb29abaaa7d280b69b
-
SHA256
6d9df4990e9ccab9d5704e4023e421eadd9dc1a210cb0e4a627d91d97688548a
-
SHA512
d7d00c2fe5ed54fb8d05984e4a1c06b3612be7f380bceb59ee7efc6d38c08ec9111df5b0d92ad9ad8f10c6c4076cdbaaa65f01ddfa84eaa316d54dd47751481e
-
SSDEEP
192:bONbedw+lJ5I1VHE0ZRHsvUAEBcItG0bgDLOSrfkL2Vkmmmmmmmmmmmmmmmm523b:bONbedw+lJ5qAEBcIwFLOSrfkRmmmmmZ
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2016 984 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 984 wrote to memory of 2016 984 AcroRd32.exe 29 PID 984 wrote to memory of 2016 984 AcroRd32.exe 29 PID 984 wrote to memory of 2016 984 AcroRd32.exe 29 PID 984 wrote to memory of 2016 984 AcroRd32.exe 29
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\eaca05c153ff24184754e3a1b0591b25_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 984 -s 7602⤵
- Program crash
PID:2016
-