Analysis
-
max time kernel
92s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 15:17
Behavioral task
behavioral1
Sample
93a1c5f2eb666574952f2b76846e86ff_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
93a1c5f2eb666574952f2b76846e86ff_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
93a1c5f2eb666574952f2b76846e86ff_JaffaCakes118.pdf
-
Size
76KB
-
MD5
93a1c5f2eb666574952f2b76846e86ff
-
SHA1
c71f5ef9f868788fac2dca18dcc5ca6723886e5b
-
SHA256
da0b96845614558354d932a7d6576c58a2a7e6cf5add5e68f2b91d145b0e7ed9
-
SHA512
d1e14ba483203ab34914523fdeb8b0bbe590ea5dea78b69eb611454301e56a5851dcc11aa50d8f63087be6f4eae40b47d288a8f00a23a2dd44dca82c6c7b2d95
-
SSDEEP
1536:eobbezhBXsOgGjHWegQMR56G/AZZ8YB+mOpy1k2SWk7c8c5H4pZfe3WUpX:rbmhBXsOgCHTtiMG/AZRe0+2MGYDfeD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2928 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2928 AcroRd32.exe 2928 AcroRd32.exe 2928 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\93a1c5f2eb666574952f2b76846e86ff_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD500b3232825ae5ea95fbfcf3484c093c6
SHA10b68bfc5d1d69cc1502a1480c1eab41029331e8d
SHA25661cf698825cbc7c7929e8c5f7aa2a501d75ce12ac91d8e21a3e0d44abf7e66c0
SHA512ac40798f1087fdd46ddc39e80ced4f626b4ccf21de56c812ba1d28b8f116ceaad4471f5aba7b49c7bde18d90f84a70750c3ad21cfcb698e21f5d312ea8aa9964