Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 22:04
Behavioral task
behavioral1
Sample
f0b3270ca660057b2242570fd69ff080_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0b3270ca660057b2242570fd69ff080_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
f0b3270ca660057b2242570fd69ff080_JaffaCakes118.pdf
-
Size
15KB
-
MD5
f0b3270ca660057b2242570fd69ff080
-
SHA1
0a74965fc6d8974bb147188899ae3854ea07003f
-
SHA256
a259c1e6aa23f0196a1607e9ffb2c4919ee6e018e1c3b386f7bc1c0cfcda68b5
-
SHA512
591c3d4864ac583a42488c946a0def85c45775f3ef3f20c0a8eb845364c5a3fbdd0fd466275fd2d09a57626e76afc333f3eb368a0478e4011b8b63b40bb65adb
-
SSDEEP
384:4ONyCeewIjJizRGJCL+4SZiMYsja5PK7PEKTL6LQOyxwpu7a7GwOuv:FZ8Cs
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2080 1800 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1800 AcroRd32.exe 1800 AcroRd32.exe 1800 AcroRd32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1800 wrote to memory of 2080 1800 AcroRd32.exe 30 PID 1800 wrote to memory of 2080 1800 AcroRd32.exe 30 PID 1800 wrote to memory of 2080 1800 AcroRd32.exe 30 PID 1800 wrote to memory of 2080 1800 AcroRd32.exe 30
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\f0b3270ca660057b2242570fd69ff080_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 7522⤵
- Program crash
PID:2080
-