Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 23:52
Behavioral task
behavioral1
Sample
a8bc93d6d88632feee7d69dbdc766b69_JaffaCakes118.pdf
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a8bc93d6d88632feee7d69dbdc766b69_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
a8bc93d6d88632feee7d69dbdc766b69_JaffaCakes118.pdf
-
Size
34KB
-
MD5
a8bc93d6d88632feee7d69dbdc766b69
-
SHA1
03c5f123d35640ea5c06566b1fd129a8554aeacb
-
SHA256
a093923f9b8566e0d6ad7fb5c5fb20b2620186e27e367cdce3b34d8bdbbf8693
-
SHA512
7a97e9af2d4300a417da410d7f61a6e78fa13a4db7d81fc25311d533629db01e035f6d4391d0ca48db796cb6d2a6a83e4d021610a0d484eb675feaf479f3b0cf
-
SSDEEP
768:rzrI6uJYgWz6s/gl/TScVnlB6njACT0SXkYAx2WMjfh8:rPI6+RlbScZmnkCTkYmMjfh8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1752 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1752 AcroRd32.exe 1752 AcroRd32.exe 1752 AcroRd32.exe 1752 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a8bc93d6d88632feee7d69dbdc766b69_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58df8516b49c9acbc2bf31fd2f5b768e2
SHA18edad6ba34e731ff723c0d45884d2e8cf9cbaa85
SHA2566ea345d1bcbd729518290091320ce87d4d8e9b78a48b54008cf5e439fe099592
SHA512a67a16067c4fec4806e36ee91cd6f6676d1706abc9471da03fedd0d986876b942d6110f4f497549c7f1523588b4554ee85e54e6b15c5f42706a3319f6ae16cc8