Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 22:02
Behavioral task
behavioral1
Sample
75e8b13fa620f321092e84ff7333131a_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
75e8b13fa620f321092e84ff7333131a_JaffaCakes118.pdf
Resource
win10v2004-20240709-en
General
-
Target
75e8b13fa620f321092e84ff7333131a_JaffaCakes118.pdf
-
Size
12KB
-
MD5
75e8b13fa620f321092e84ff7333131a
-
SHA1
7516e060f300397e55dca014925a6685fe4c0cc8
-
SHA256
228cf78c90bc67a047c92284eae8340647c2e93c4f869752d1503b64a35c1254
-
SHA512
24d6d201544b77d21d489153329f8f6787826e9fc698cb7a9485ddac4c555e4c541d21b9c7da7ad43c6a3aa83ea476a197cd89361eb74f57bf6621cc93ac0b20
-
SSDEEP
192:DL/ysuAtPUskkkkkkkkkkkkkkkkkkkkkkkkkkkpUNkia0kkkkkskkkNkvktkkkjI:DL/ysudmAg9mnTzZRMwcOALMsRP4HE+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2088 AcroRd32.exe 2088 AcroRd32.exe 2088 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\75e8b13fa620f321092e84ff7333131a_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2088