Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 19:35
Behavioral task
behavioral1
Sample
756db965246ac476728804cfd46bbeeb_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
756db965246ac476728804cfd46bbeeb_JaffaCakes118.pdf
Resource
win10v2004-20240709-en
General
-
Target
756db965246ac476728804cfd46bbeeb_JaffaCakes118.pdf
-
Size
76KB
-
MD5
756db965246ac476728804cfd46bbeeb
-
SHA1
7a4f1f588d82f77c240da8a95d2d32c573fcc07f
-
SHA256
41e8b704c04fc9783d6a2ea24dbeba9bf289b4c7d750ca0479b7eeb00ce47a9b
-
SHA512
4fc66b1fceac6c9555776c269773610e22b57d938126e775d88be4c7a9063c85dd45b91a0829bc753d7588e4e3ad3871d27c8409397be2e13f29dcd5ccbc8862
-
SSDEEP
1536:TTJzZL/rUFdDuQc7Qui9fGyTFl0kaVpMBIX0L/MrH+NqH4r7Lo:nJ9EHQcuaDZl0kYvXCwfYrQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2680 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2680 AcroRd32.exe 2680 AcroRd32.exe 2680 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\756db965246ac476728804cfd46bbeeb_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55732b52c9017df78a25431bd867825e6
SHA1be1ab9d60b21f324c73564f31dad19a8a17755f4
SHA256f668bc71ad20b6c58bf1504c1084b4021341448f7b010ef4f45d2e4cdfe6eaaa
SHA5129fe4d2ed6ce3fcc4d6a55166ea3f17c5c7fa4330a722fb37a44736167b73d48827ab36cb5a9eb7db1bd7549313b7c31ebd4f7832752021ee2da107f66ce5b644