Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 04:52
Behavioral task
behavioral1
Sample
a143f64cfdbc987ebe8f75058644e7ae_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a143f64cfdbc987ebe8f75058644e7ae_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
a143f64cfdbc987ebe8f75058644e7ae_JaffaCakes118.pdf
-
Size
85KB
-
MD5
a143f64cfdbc987ebe8f75058644e7ae
-
SHA1
0c27eade53b62d4e0a6339d4cb460d564fa433f8
-
SHA256
a3433983ed4b618cc3ff947e7c3d5192a1057b018ec1027cbc9bba6b63574a44
-
SHA512
e4b989b708d6c246452ceb9d6fef4bd02b8662fcf086e7f45eb43071722d55abb328ed49242945a2657d0370cd199ac56a5056c06eab62d9677fbf82a0afcbbf
-
SSDEEP
1536:DFw7n/pK27vS3Mms0UCVEcqxukq7/2eBuhPlDNTlTkWapOtQVmLY1FW9owjcuYuQ:q7BK2DS3Mms0vuxukw2vdDBl5tQVm8Ie
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2332 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2332 AcroRd32.exe 2332 AcroRd32.exe 2332 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a143f64cfdbc987ebe8f75058644e7ae_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD529b9c406d107d520b841d76553e0a064
SHA1460549273de1de22626fb202154f732ecdf6907a
SHA2562786e11f08d33b0a438f0c7db754c235b9ba1ce533d28f2c586e0d795958672b
SHA512d98698022094fa99ed2c825156548606e30e9d9cde16fe077bd9a512f4193529d80480678e00f15801475eb602e86e76547d65cbdb03ca386c03bbd6706af73d