Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 02:11
Behavioral task
behavioral1
Sample
a0d33d07a611c349c380a874fa321682_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a0d33d07a611c349c380a874fa321682_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
a0d33d07a611c349c380a874fa321682_JaffaCakes118.pdf
-
Size
82KB
-
MD5
a0d33d07a611c349c380a874fa321682
-
SHA1
60e39875dfda95ae9b07cba3ad84e56b047e2e3f
-
SHA256
be1e4d0d53763520a07398c0363e210165c281f7adf4afbadd273f36d08cb199
-
SHA512
041779ce6fc826b1d866dfd372fd13bc0316a60d1d4623b32fc1981913ea061620a1e96d003e9834c6755ede9a167b64808016d61b101de46babff957d47c674
-
SSDEEP
1536:Y7lpYGxqY0KHiNxSD2tXbGVdU0hhBs2pM1jJR0Ex/q/zlMWNqt9VMoT689WUpO7/:EXnSiDIkUMhB5CjJRtxyormoG8g7zxKk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2032 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2032 AcroRd32.exe 2032 AcroRd32.exe 2032 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a0d33d07a611c349c380a874fa321682_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD522e840eb1976db8fbe71cd20535d0484
SHA1d0770cbaeb7741e97c86ff71d831305f8ec47d5e
SHA2564413331a4962e2be743892136b3228dbbb24342787b44b796f4b8ad700bffddb
SHA512d5ee0d24e3c5a205b2c9b70628938277d73066e0b9eeb4124fa6de3c2456a28a2a6554c48bf2130517f964d127e66e559998c5dd020c767ecda8760da9a786b9