Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-08-2024 06:31
Behavioral task
behavioral1
Sample
835e593d951d8735bd7b3118ee004576_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
835e593d951d8735bd7b3118ee004576_JaffaCakes118.pdf
Resource
win10v2004-20240730-en
General
-
Target
835e593d951d8735bd7b3118ee004576_JaffaCakes118.pdf
-
Size
85KB
-
MD5
835e593d951d8735bd7b3118ee004576
-
SHA1
ecf377fa4f51b1101b238da2eda637db9f8186d6
-
SHA256
aa6b2ad3083b80840d9ffd18bfe970f06b604fa65b3ff6db734292751d0238aa
-
SHA512
b13bedd99214ae7c3cc737eb7c3718bedb97a4299ef1c43fa5d48e00c5158857f2ae9b2a77902fb950ce1184650dde0f9cc3f8ca38fb3dc8aad8bd0747fdb58c
-
SSDEEP
1536:uZ2gq3K1y/LZXaXFBZ5bZrxY0WcNSScWyv78tEwYWgE+s0MkihXZSJW6pOu22MGu:aLO9KXFBZ59rW0MWQeg4kihXZSqu2J1V
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2732 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2732 AcroRd32.exe 2732 AcroRd32.exe 2732 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\835e593d951d8735bd7b3118ee004576_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b9b1fea982f53946e537a53489328902
SHA1102f0d087658ef386bb91c759d7eab65eec5512a
SHA256b162e18c0529c29d5c5685d4befb780e0c4e9cf2dc8bd47dc3a598f426cf9d13
SHA51268bf8c9f1ba5aefad8d67987a21d70120c6d40a7f6e1dfef963076e8abbbdcfca40cb4e1db410c4b21729b210d69615b8afe7e9e179fdfcd0e9029e0686e986e