Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 12:33
Behavioral task
behavioral1
Sample
86112744d884e743b0176a388fec7f42_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
86112744d884e743b0176a388fec7f42_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
86112744d884e743b0176a388fec7f42_JaffaCakes118.pdf
-
Size
66KB
-
MD5
86112744d884e743b0176a388fec7f42
-
SHA1
be3b53efd759d7de637e3afa8e469374f7a76996
-
SHA256
d15b9bbf7a4e8450232a8f7033a5bb07e9584f52311eb9837e2a9a183ae5d7a8
-
SHA512
e03c0947631615d10ec3b51a3b3426b55b5b28bc3b9cd0c37399ca3199098187bebde7636db09a10c28a2c61f00bbad6c01ae10c57990ecf88b6d08dd0005d8f
-
SSDEEP
1536:a/fz7M+UNjLSdZdLRxSGqPtXPSJjbyl756r+iWZN6hz:ozytLSlg01byl7LrNo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2712 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2712 AcroRd32.exe 2712 AcroRd32.exe 2712 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\86112744d884e743b0176a388fec7f42_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59031c414733b1ee5cee614dfadee5ae0
SHA1ed470659bef0f4796625e0a7f969c26154cf1cb8
SHA256fe03955e6b717339fdc17105c16a12427f7b41ea8a50f265697080a13c0ecc3c
SHA5124126ccf0c41b403c8918281bc2a98c7a7122db0aaba640a667bdfab3c0ed0763d83901c34e453eb3ec19e1a5e149c521e169bfa12505a449a94bfc03303bc601