Analysis
-
max time kernel
121s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 07:33
Behavioral task
behavioral1
Sample
6ac071e7e056a69defadf0b7b76aa7be_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6ac071e7e056a69defadf0b7b76aa7be_JaffaCakes118.pdf
Resource
win10v2004-20240709-en
General
-
Target
6ac071e7e056a69defadf0b7b76aa7be_JaffaCakes118.pdf
-
Size
16KB
-
MD5
6ac071e7e056a69defadf0b7b76aa7be
-
SHA1
3f8de2c7b48172ffc790af20f5badcf51e0eb28c
-
SHA256
e7846db42bf6da6407f7ab4684f2e1bfbaf93279fb02f841de3ca91b74da95a2
-
SHA512
fbc086c6fb6dc7529de273394f465f21df3d5b70cfb542b549d402149f7c3e4c4748a12ffbcb187bcc2b068adafdef5e2ebfc11cf8f12fde550ccaab38504943
-
SSDEEP
384:WP5uqkucWvhu6Igg8qSFLab1Hotp1uTy4OO7NorAE+maT2NtpUlC+UF2D1NuYH:dWexkR+dY1vULr8IlC+n1NR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2320 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2320 AcroRd32.exe 2320 AcroRd32.exe 2320 AcroRd32.exe 2320 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\6ac071e7e056a69defadf0b7b76aa7be_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5327080ff932e5f00313f8b31388e0225
SHA13bdc13ee101d3f41e1e6b63b09ae544b2043d074
SHA2561b8a1a822ae3f502bfd51296027de5eecb679b89c03c39d75f0ede2417a7a4f9
SHA512dfcdb93a1707448d237466abac3ced8c01208e581194da95550badaf6b348fc60fee80146de02bfa7f7fc59950fe2095c31818d9d590daac34303c65e2a48755