Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 18:33
Behavioral task
behavioral1
Sample
8b817fa60cf731ec29e020380ba55372_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8b817fa60cf731ec29e020380ba55372_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
8b817fa60cf731ec29e020380ba55372_JaffaCakes118.pdf
-
Size
77KB
-
MD5
8b817fa60cf731ec29e020380ba55372
-
SHA1
dfd74f9a0a5d4f2439bb3d4c8bfd705ee825c21e
-
SHA256
be50ccbf22626d18eaefa22b6d4c71a81f8aeef9460dcffd80678c27724cbe45
-
SHA512
be51822f2846c4b7d24f77264016a62a539ab61f5875736d3d9b8500f8308c7fbf8d2f883d9f899bf1b74c0625f6abd788b2bf7fb681ec4d1965d4e080e53d4c
-
SSDEEP
1536:0wdHXZMlneQ2YcTYqRPjne5YiqkKWyRCqlpUYwT4W8pO70NYeGghAq:P9XZHQDckqRPze5Yv9RCqbUYwTj7YYJY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1996 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1996 AcroRd32.exe 1996 AcroRd32.exe 1996 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\8b817fa60cf731ec29e020380ba55372_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD534b05a7f07bd7fd90434c9aca75d4563
SHA1606b53d15b1ea44696a59968908636d2b4e6edb3
SHA256c4ae27fbea7f166731aaff947c284674d254f6846e907c4c8da036c028d60ec0
SHA512e10f6a1b32fd9a4c50bd05d873ea1a428e25f0639794cea6a115e3d49c7bf108637baf60a3df3fae83a237b6c1506bf9534fbdc31465d71a97fc829a645efb00