Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:27
Behavioral task
behavioral1
Sample
81c8e2a8aab75fa442fdefa51a058266_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
81c8e2a8aab75fa442fdefa51a058266_JaffaCakes118.pdf
Resource
win10v2004-20240730-en
General
-
Target
81c8e2a8aab75fa442fdefa51a058266_JaffaCakes118.pdf
-
Size
87KB
-
MD5
81c8e2a8aab75fa442fdefa51a058266
-
SHA1
106ae0549d8e70eced694edabe408b5cb15db2bc
-
SHA256
a7975aa6d54c058601a7a5df9c6274624d40fa9f9f0485c7ba4b11a6b64218a1
-
SHA512
7b4e9ab00846e647b69a151a9c930c903de55ed76eddbe90e5d9dd212ab769cec4394d9b4cb5509789c43dc20a737f8777ecbff986405c565745cff755ee826a
-
SSDEEP
1536:kN6UniRf0otm3Ap3KgtH304Wl9F/rDuZWbpONNu09jum:SiRHmA/kZ/rDubNEE3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1984 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1984 AcroRd32.exe 1984 AcroRd32.exe 1984 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\81c8e2a8aab75fa442fdefa51a058266_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5cf61e929d247ed483fa5a68f6ba52e03
SHA1af2eee3f6702c3063dad4c82421104c4640cd3a4
SHA2569e6b3c6cc07f62582b2a2d45d8a59333d83e455dfe181ff0dedbc9fecb8a289b
SHA512284d5dc03cf0ba6b03e985cc56c3adbe9c81764c204b0bf2f4f407d1e57d14d97ec9942ef80b451e141e8e56d20a0c40ea7a90939eefe46947e75c0641b5df4f