Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 05:52
Behavioral task
behavioral1
Sample
8d903b9c62cfe584db29eab57f32d116_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8d903b9c62cfe584db29eab57f32d116_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
8d903b9c62cfe584db29eab57f32d116_JaffaCakes118.pdf
-
Size
91KB
-
MD5
8d903b9c62cfe584db29eab57f32d116
-
SHA1
762e48abc92b6a9608b0f5b0fa0458b704e659ac
-
SHA256
9620f8214554f907bb0615386303a05dd83315be3f4bf414254164ec148ad6b3
-
SHA512
dcda5833325d250740f9a24e4ae99ce7e69d3d9d465f5c3e4dd48279e330b2d640cc764674e216730895371b7ae5abc6e738caa124935f2d21cc1a6e7ec85c02
-
SSDEEP
1536:Ob9EMMilzDuyXoLtAtlgD95X31i8kW6pOu26WAYE4qPyBmGGxX:yBzYLiKD7H1ru2eYE4qP6md
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2364 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2364 AcroRd32.exe 2364 AcroRd32.exe 2364 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\8d903b9c62cfe584db29eab57f32d116_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59c44fdd487d6445a1f56fcc180ff4a0f
SHA1a0e1862eef125c86880ee72b517a30b8bd6db586
SHA256b29e018646a88a31371f61b2b681c5293cd5a143404ae8e1a6824215f6a495c1
SHA512fd93ed1d5809c669dfbcad62870fc44848229faf5e4854eee55933cf6eba359607851d13669abdbbb3909378f81eb90c452c9d067739e455ad34bc8184012eb4