Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 19:30
Behavioral task
behavioral1
Sample
a3d653011a1697fc0e02441ebe41f7e0_JaffaCakes118.pdf
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a3d653011a1697fc0e02441ebe41f7e0_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
a3d653011a1697fc0e02441ebe41f7e0_JaffaCakes118.pdf
-
Size
5KB
-
MD5
a3d653011a1697fc0e02441ebe41f7e0
-
SHA1
c6acf13387645ee695918088763e97fd8166a302
-
SHA256
45f75ae771a304c04d0efd272652a65bd55419be98b0c6d848a458e04ebcbb5f
-
SHA512
b15620e72ca4bc060d0ba17ba7d2a4e183b8a3d37b0685462fd01b6ff5980726440a5eb40cf074114650dd70d06d2ca3d6dd58db3c39febd88b998db6260f805
-
SSDEEP
96:oJLq7oKYOAcQshybM5fQn/XMwdXwC5rJ0JAmXYjs/a7w6iVHqWcK3swyG:oJLeonnccnnftrJ0amIs/NNFt3swT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2348 AcroRd32.exe 2348 AcroRd32.exe 2348 AcroRd32.exe 2348 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a3d653011a1697fc0e02441ebe41f7e0_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2348