Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 22:17
Behavioral task
behavioral1
Sample
75f459bcb9b3e41767782531948b062a_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
75f459bcb9b3e41767782531948b062a_JaffaCakes118.pdf
Resource
win10v2004-20240709-en
General
-
Target
75f459bcb9b3e41767782531948b062a_JaffaCakes118.pdf
-
Size
72KB
-
MD5
75f459bcb9b3e41767782531948b062a
-
SHA1
addb629e7ee32b8dc776bd4cdfd29eee974c985c
-
SHA256
370181512a7aadaacf894911240197fb1f1c2dbea75830be179f36967a0db3be
-
SHA512
bed08832bd1e2248c7f6bdfe38d5436b2170cbe05f1796bceff8f99961b4cc53dff3ef462b856eba7bc1a56280a608f4e268d73d8507e0afd933e71cd843c40b
-
SSDEEP
1536:kKULyssGYSc9stN9JkmesS8cMLPthjsyObbbHRf6o9Ysg1tK/ydcA:DUL2GYSc9sz9JkwtRsycbHNg1I/yp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2360 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2360 AcroRd32.exe 2360 AcroRd32.exe 2360 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\75f459bcb9b3e41767782531948b062a_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57282e5495d4eb22c595e52da1e55861a
SHA163beddbe33a5c2e0c349c4ca789f291388e30832
SHA2563facd0755c3f64cee474ac8f0e4843d67e4f50e601a114117697b2f4dc401aef
SHA5129d15aa3d8f384886fdbdae1a67f0612de107252ad3772af684a85986410771a9af43562235c54e4498978a96629000dd05558c37a230a68db39748e9ff4a58d1