Analysis
-
max time kernel
94s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 00:00
Behavioral task
behavioral1
Sample
697c5311dca80776ddf895461f3bc217_JaffaCakes118.pdf
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
697c5311dca80776ddf895461f3bc217_JaffaCakes118.pdf
Resource
win10v2004-20240709-en
General
-
Target
697c5311dca80776ddf895461f3bc217_JaffaCakes118.pdf
-
Size
86KB
-
MD5
697c5311dca80776ddf895461f3bc217
-
SHA1
0ccb8058903d54cc15c9f7b5ff9de2cf0413d091
-
SHA256
72c9636f80c77cd1ec5c8701c14744c1dbb1aa95a6bdb7381971c235b90b171a
-
SHA512
e8c7e8d9c85cab16739d2922eac196b13cdbe2881fe4cf89bbc051024106d844e5dd07f7725cd857b05a649baa78da01ea0e53bb94bb0db664eb3648694c6d9d
-
SSDEEP
1536:mslt+HMpkmSaT6WY5z/95rB+/gybyMDKpQUqjy4q6+OAW07xhuUr8/knWXpO/HVj:VFpuHWY5D046yrKUquPpO87x35p/N
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2244 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2244 AcroRd32.exe 2244 AcroRd32.exe 2244 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\697c5311dca80776ddf895461f3bc217_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5734bb2cb689a13fa3e502881e5c0af6f
SHA19f3e34b9db311052d7cf3d9c36c81ab2134cbee2
SHA256f48455a25ba1dd4700ea8b90bc82fcd8988d6a2ffeb84baebeb9a93b721b7a11
SHA5122aca248e5184e5d0fca38e1066c9a9f6999478cf5bfaf88975a5d941befa0defa4115e8fa973b4846461ed794cefbca784f2140cdcefbe5cb1338285bd7394a0