Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 03:04
Behavioral task
behavioral1
Sample
a523a9aa266dc54ff8ef629f292776c5_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a523a9aa266dc54ff8ef629f292776c5_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
a523a9aa266dc54ff8ef629f292776c5_JaffaCakes118.pdf
-
Size
74KB
-
MD5
a523a9aa266dc54ff8ef629f292776c5
-
SHA1
c2c855d73bfbbb0151170771578e868a8235496d
-
SHA256
009e199013bda132dfca181c48f18a39164cbd3a13ea089c98b2b159727c9909
-
SHA512
3b02d05f97ce8293b51ee8749173c1aba203c176996f2b5dbd6b00c893651e182a77ab48fc0f924f0f24b36f18d9972fa7562bc97f9c8e4d1b10107e033fb25c
-
SSDEEP
1536:rDG73jjRIhXRm/6/+KE69oeHlAie6W98KtW6pOu26WQnDOfNA:m3jjiY6/+KEGnHaiNE8K+u2un6K
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2848 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2848 AcroRd32.exe 2848 AcroRd32.exe 2848 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a523a9aa266dc54ff8ef629f292776c5_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53a7f4da46c1dd6a0dc2525479cc76800
SHA14d9a107aeecdd97325756053de5d4e3d6c2d8ab8
SHA25672b12c21478211ebccca8e54b7c6d0b291154b26e3abc320e12b04db4761f99b
SHA5121950318c497390b700b16fc0553b81df7862184661cfc49723340fea4af24f03c8443f25fb89b01da5b1dd212e7c27dd23fdb5724c228e02843757303b43feae