Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 12:08
Behavioral task
behavioral1
Sample
8a4df3ad5074af5e2b5b775f9574ca55_JaffaCakes118.pdf
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8a4df3ad5074af5e2b5b775f9574ca55_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
8a4df3ad5074af5e2b5b775f9574ca55_JaffaCakes118.pdf
-
Size
72KB
-
MD5
8a4df3ad5074af5e2b5b775f9574ca55
-
SHA1
31a5db5f331c6febabc8bbb792b74b05055406bd
-
SHA256
76e5ede503a2daa2070635b0bba9c3ad5a2d87a9eab3b03a4b2bf43c73b198a0
-
SHA512
1a338b0441071ea1dd5bfcaef084abc7eac8d8599dd7696ec30e63384db7da881dd85cfba79c5fa6e5e955e0fad82ac90da5d845c9dd9cbb1589dab00f92f7ee
-
SSDEEP
1536:4JGdA+ZXK9kqNxKzPxSFBbQ2N/3keWPE5DWWNJWApO6byd:bYGqbQ2N/3kxE5/w64
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1856 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1856 AcroRd32.exe 1856 AcroRd32.exe 1856 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\8a4df3ad5074af5e2b5b775f9574ca55_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53709649dc93970898cad03ddead3c246
SHA1585145247cd1ef550cb904ebed8739993ccb1c00
SHA256aa0118e44d1952a1a7034341127a3a73425ffcfeb6d970919d3ac1fa9ec6c054
SHA51279e36c721c0df667978b22131d1473105aa3ee19138dae2f684f59384d546e2360e7cf2dd2680da40d78c77af3127535e65414b7dc6d4439b88b30d489ab184c