Analysis
-
max time kernel
94s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 15:17
Behavioral task
behavioral1
Sample
86934ed31cd291696cca80b9012f92b3_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
86934ed31cd291696cca80b9012f92b3_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
86934ed31cd291696cca80b9012f92b3_JaffaCakes118.pdf
-
Size
79KB
-
MD5
86934ed31cd291696cca80b9012f92b3
-
SHA1
1154cce34f6e9dc702ed3f01147ae007c2fab96c
-
SHA256
591553b879498ccfb5e6c632b02f58064418310ef625912fc833c7337e2e1bf2
-
SHA512
e444033fcd220b4234ffe9a92550c8f10626aa3cbd60a123f406dfa4191e65491bad6d83ee23985ba21476a11556c911d09cf784328225a9fa90f5715a1e8f25
-
SSDEEP
1536:UFQpc0Vt6NmmZzbJVyGZjjOVe0ceB1EW4GdU/Of0A9JwriFOUW8pO++J0P:QH6pyzbfdZjjaLv8GwGJwpv+J
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2528 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\86934ed31cd291696cca80b9012f92b3_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD529ca637d501fb0bf4180415bf68db428
SHA194bf79154e667e8cd72bbdfaed3550493dba3e9c
SHA256cae302d95b8ab65727b8fdd0924df5ee6601aa3b8fc7aaf8541c850760a893f0
SHA5122d21727bc95445ce50052ff2d7da83fcbb8974c8f43b937975879ffe35ffbe5d0bbb00c44154f5db01fbd3636c4f1900875cb74c990d9f37e95368ccdf8a5d51