Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 14:32
Behavioral task
behavioral1
Sample
8abbf72bacf669cb15f47bd3921b2815_JaffaCakes118.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8abbf72bacf669cb15f47bd3921b2815_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
8abbf72bacf669cb15f47bd3921b2815_JaffaCakes118.pdf
-
Size
101KB
-
MD5
8abbf72bacf669cb15f47bd3921b2815
-
SHA1
12f32829f7b1fd05e7898ef76353d5bcd3fbbdba
-
SHA256
d67e0ccb9949af1871303879bdf9603d19e4595e1368a24d7ba215b6201b6cc5
-
SHA512
be18d9914403067089eac9f020715f819d855b521d5376866071b231078520f4a389cb9c3a4f5dc44ee2dec62eec4990378ea501cf78ee4250cd854880c06b0e
-
SSDEEP
3072:9ZKOIW5b4ui+akE+ieF9spmRUkt0QmOOvikb5Wc:r0AbB7bieF9spmVtdxOvikbh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2572 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2572 AcroRd32.exe 2572 AcroRd32.exe 2572 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\8abbf72bacf669cb15f47bd3921b2815_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD573c3af7bc386f691cd6e4f0da87d18e4
SHA1c14e1e3d23feefbed9caf64bc0ccdf322dd0950b
SHA256e79d96d0ff3301347ca8476b83cbaf3b3a3a34bd4883d39a224fd5e750e96784
SHA512d9f2248d3bf218aa294f72c0ca93fd7af587cbe892d2e4a9b640e85d951ab9f6d5cf0f8ff0a11ef1cc3c90493291ef162dd42318f8b3f4928d2125cad3659d3e