Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 02:05
Behavioral task
behavioral1
Sample
a4f81b1c391c3db8b80b6c84bd4f7f75_JaffaCakes118.pdf
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a4f81b1c391c3db8b80b6c84bd4f7f75_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
a4f81b1c391c3db8b80b6c84bd4f7f75_JaffaCakes118.pdf
-
Size
88KB
-
MD5
a4f81b1c391c3db8b80b6c84bd4f7f75
-
SHA1
564e81348b3b16f1bfefcab2c522e0093480b793
-
SHA256
83885e9f8994240d88cb7aaa87945601bfe7d87da3a3321c314b97488b1138f4
-
SHA512
9dd3921d9212320b59e5d051ba59ce8e448689dabb229ab2b892e9ec2b78d1a267f622e699cfd3fd81f333f06e795f5022d8834a52cccf3e20dbae0f71a0878c
-
SSDEEP
1536:62GJxvIv8m8uymXE4ap/Mjnlhez2EqzUwTYz/FAVJ+yVpTWhP/tvntVHWUpO7BX4:DhF8uAbpEDlhez2EqzbTYz/FAVIwKntj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2704 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2704 AcroRd32.exe 2704 AcroRd32.exe 2704 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a4f81b1c391c3db8b80b6c84bd4f7f75_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51a7b8fcb6d458998b7bb55b3083ba609
SHA1c2ba0224d9b4b2fc5f0fb2d9c432f8398ce042d4
SHA2560616e80597c97dcdf78ffd3250086e0250a1f3b4d1f12e17973518d37db78130
SHA512b7950206f9f024617751fbdcb3e26ac7a4f79d3324294392326a9ae9b962fff7b8e9e0a97f2873e2468c14c4c1aabdd889c8dea0d87ca52e310b1704fff1ea6c