Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 15:19
Behavioral task
behavioral1
Sample
7499286022340a99eb38879b3bbb3e41_JaffaCakes118.pdf
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7499286022340a99eb38879b3bbb3e41_JaffaCakes118.pdf
Resource
win10v2004-20240709-en
General
-
Target
7499286022340a99eb38879b3bbb3e41_JaffaCakes118.pdf
-
Size
73KB
-
MD5
7499286022340a99eb38879b3bbb3e41
-
SHA1
b683585778dd9f4aeb0efd8a5b7010c21af065c1
-
SHA256
80c39f131fa46f3c5a09f5e3aaa32ae01ce8a944308843f843ce54902bfab5b2
-
SHA512
4033c02f65e252e3e891e5f409a628e492dc9d2852e64bea1fb639e9a95685d38c4792c46462cf93d59384d7b48ba69a151366e65ed34a9104f5a980df0415b2
-
SSDEEP
1536:m++N527Fw3J7czzKaec2idn5Ka+7RYYU2KweDJOE73+GWApO6eWTIGm5BhSv3kLI:o5VczF8i95gF62KweDJnT+N6dhm5zJit
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2128 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2128 AcroRd32.exe 2128 AcroRd32.exe 2128 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\7499286022340a99eb38879b3bbb3e41_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59cbf153bfafeabe4be4613b2e31c96d1
SHA17539aa976c4e9e8526a233c095b147e6999aec54
SHA256581d5a46153e65b8dd1cc3676a59c5f1f0c06434ddf3b8d2f85a9dfedc81c856
SHA51278807a311760f1892c178afbcb65628ffaa9f6913440be0f9aced7008dbca31978f4f60ad502752763ed936078190785864b8a97935c74921ade60bee9dc3d81