Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 12:34
Behavioral task
behavioral1
Sample
9620271d9ae32fef5c5b9a46bf83c2c0_JaffaCakes118.pdf
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9620271d9ae32fef5c5b9a46bf83c2c0_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
9620271d9ae32fef5c5b9a46bf83c2c0_JaffaCakes118.pdf
-
Size
84KB
-
MD5
9620271d9ae32fef5c5b9a46bf83c2c0
-
SHA1
303988329fb582647c1096b0091e79c802c51165
-
SHA256
0ba9ab03be2cfa2c85d7955eb57990b7b85c8734ebe38f6ee21d0c2d81516e0a
-
SHA512
02f3ec032979040b409814fda2c613fee645bfecbed66cc6738302c023118fc299a4ca9a60a07cfb14bd43d2730b635c79291a73b2b5c2dc64d3979108ad8307
-
SSDEEP
1536:xoghHcNtIYzRO7mYGQ8B1RmOtDJziKL+1TyWGpOKAD7xbpWWojEnfh914No:mtIYzcqYgmIJAbKeb5fRh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2160 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2160 AcroRd32.exe 2160 AcroRd32.exe 2160 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\9620271d9ae32fef5c5b9a46bf83c2c0_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2160
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fcec62132eb7c932cd076e31a7a82992
SHA1ff23b29e68d4580f28a450d0eb69a79683ff8c98
SHA256235dce20e086e47675429e5fae56d12f818cb0f78a3e345e8cc94e09f1f46a53
SHA5129ad29dca7527e32a7ba8b240ff4d60f90e801b8e0f6d8c2e4995c4106735340f039d5557244e02eb69e414b50fa05cf1b8d8739451ebd00208cc61af2504b9cc