Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-08-2024 16:56
Behavioral task
behavioral1
Sample
93f29538b4bb1df5ebc76184048c4aef_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
93f29538b4bb1df5ebc76184048c4aef_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
93f29538b4bb1df5ebc76184048c4aef_JaffaCakes118.pdf
-
Size
75KB
-
MD5
93f29538b4bb1df5ebc76184048c4aef
-
SHA1
4a0e3476926df19e507f9e2cdca3bd7f3c2dfd11
-
SHA256
19a5f79fb6dc4175c99283dbfeec43ab9683c309d371aad5b3d769e920a709c0
-
SHA512
7a269165cad13f7ff662d3c46a6bf06fa45886ac006ca604b8df139a05e065006a2388f29d1e8200df5525f41846f9b3c88fcfce90f7d1be3b04c0d05a32b3c8
-
SSDEEP
1536:kNUTHMkn6vKNJS9YoppL8+ZHeeJMA6UkrvXXx6WxqGt4leWspO2zvdg:TskYKNU1LL8CHeeJJr2xiGet2+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2512 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2512 AcroRd32.exe 2512 AcroRd32.exe 2512 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\93f29538b4bb1df5ebc76184048c4aef_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55310b44cc9d37cd9f388a73477e74aba
SHA1a89e08da5727ff4dcc1ce1df53f88f2c054607ff
SHA25643bf14fc62daab0ca740c46f1363f8adcfd693b66ba17f346577726eb3e57f15
SHA512db33730da2a8ac843c0e7657c6f14a6c14c70f8700b7b06fc7bab3f360e6f3b31f5ea3917742b7967b5a9644404af6e9c0879a0c735fbbb1b4ff667f16d22184