Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 20:59
Behavioral task
behavioral1
Sample
81c3c1ae020a49318c444fc8cd8d7d36_JaffaCakes118.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
81c3c1ae020a49318c444fc8cd8d7d36_JaffaCakes118.pdf
Resource
win10v2004-20240730-en
General
-
Target
81c3c1ae020a49318c444fc8cd8d7d36_JaffaCakes118.pdf
-
Size
80KB
-
MD5
81c3c1ae020a49318c444fc8cd8d7d36
-
SHA1
1d9718380d084362850ce2fb3e309e9ea548dade
-
SHA256
30af2766ceda8a61510ad01a59400d9faedd13a2624d20e3f90a404c3247d43c
-
SHA512
bc8bf8e9f00802f6d34af538af56f39e5b5f17bcdb7410628683522e3d37db01e39e07149583e170de53e119d1fb7e712e22ac8825467ff67f36dd21fd8b2794
-
SSDEEP
1536:NTpU/EK9fjaSPdtDMejixYU1gsqp7DkZ42yZdfFCoA4sQ2W/mzrWwzyn9DWOpOwE:tpu9jaSdt4lhg1p7DkkzUZV0gwrCfgFM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2584 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2584 AcroRd32.exe 2584 AcroRd32.exe 2584 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\81c3c1ae020a49318c444fc8cd8d7d36_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD591c1528039770f3babbcef6e9b9a5b60
SHA163cea4d9bd44d1e6f1d4f5f74b66445c3e07b5b3
SHA25624e44a6b254724b50cd3321aaff4a740665f0409c89266717e0a8b0162733442
SHA51272d03139bd2e5e313db36a1feba2f4560f063977d7bf923f369ad061d7f49bbda727664cce7b6cfce0598c982be7c1860529363b661b6aad355ca33b75c66200