Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 05:23
Behavioral task
behavioral1
Sample
a58c0747cd5f02e8f4b1233f1f05ab99_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a58c0747cd5f02e8f4b1233f1f05ab99_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
a58c0747cd5f02e8f4b1233f1f05ab99_JaffaCakes118.pdf
-
Size
74KB
-
MD5
a58c0747cd5f02e8f4b1233f1f05ab99
-
SHA1
6e8065975357e91c2061d58a8e6f10646b97e4c7
-
SHA256
3d0f2e8fb60b7ea448adf2c05b7f00709cfbc71b2396191146e6a0e2d7b18db8
-
SHA512
c81e3aecf7b3b478cfb18cd0d9a22a8168cfe393fccca8fd09c9b69e6d5894d01dd9a1711c818f6a3e46674c32049282ca3575772d37122ad3b824c575dc5ce4
-
SSDEEP
1536:JcqABrl8072w+9Km/DbWtVfX13HUAn/UKzigWUpO7qWmPWn91xVUdNg:KllxjuXsJX13Hx8+ij7gPWn91xmY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2640 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a58c0747cd5f02e8f4b1233f1f05ab99_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57f3d39aceab011ef1959a2a1283241ed
SHA16058a1cc4855cd657b9b68b9e6fde27a5c567a76
SHA2563bce018cfe1b9886e4f2e6b2bc55d9c6b5e443f3939962b4d773dfd17dac667d
SHA512707a71e7ee9dc3f6009d6656bba22214dca2b64580abb05a777058c56b0262e92ffe8f85d2203943a7a0479fc1daca30288d8aa94dcef18a2a9f43f70d960cf4