Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 00:58
Behavioral task
behavioral1
Sample
71fa4bf2abb48e9192115a7bb3aa02be_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
71fa4bf2abb48e9192115a7bb3aa02be_JaffaCakes118.pdf
Resource
win10v2004-20240709-en
General
-
Target
71fa4bf2abb48e9192115a7bb3aa02be_JaffaCakes118.pdf
-
Size
80KB
-
MD5
71fa4bf2abb48e9192115a7bb3aa02be
-
SHA1
1c029b6175e4d598fa10dde7b199c975bc46d295
-
SHA256
ee491fad49c37eb0a3cc2dd949846b1f83db6d9f68466d68da284368ffc26645
-
SHA512
a8d07c930fe579119073bcf7a46e8dcb1dff2c0cf557aa368d8de153a86b4959be831ead467480d70d63e4711abd3dab2c7754f72200c7ab89467961cb15f125
-
SSDEEP
1536:jHTKcwBaoVOCfgavWLuumNm+YesHWCpOViIWHODb87HlGWFVa:jTP5CBuLuumE+YeswViXf4Wm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2416 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2416 AcroRd32.exe 2416 AcroRd32.exe 2416 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\71fa4bf2abb48e9192115a7bb3aa02be_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD534f773e4e6178691e72fd1bf36413787
SHA19dac4b6f83d753526afd4d397a2d3adc072e5360
SHA2566e9a82cbfcf40444d4c1ebc7dd88ae43d601041fdfdf8b966e1a6be7c4741484
SHA51209fb4526eb2f11896a55058120e2b1d912a63cf7c0aa9d94147294660322b814addf4fba0974fd5bd8d069cd7861dc26d5e4010e5f3063684572a137b6479c94