Analysis
-
max time kernel
22s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 06:59
Behavioral task
behavioral1
Sample
a5d0436c518854f0e724d7162379738e_JaffaCakes118.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a5d0436c518854f0e724d7162379738e_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
a5d0436c518854f0e724d7162379738e_JaffaCakes118.pdf
-
Size
12KB
-
MD5
a5d0436c518854f0e724d7162379738e
-
SHA1
82a30f1c334d83e8ecc06ac508fbef4e984e3f4c
-
SHA256
ff5f3319339d9e1ad2556de925b549b6a126d8672a9d0d1fd94be6a3d60ae6e8
-
SHA512
0b6a1d81d9328ac110353e536ae3c3eaeca92b3d65efa82aa6f9f6d6b7f05438249cc56302c6b975b0812ae98238ec1693cf1f3e1d5b8fb1dd96bc34022593a5
-
SSDEEP
384:DLEMMLEtysyVKJmlBi2SlXXqb7mlymkqomVmumlBi2SlXXqb7mlymkqomVme/FN1:Dg/gCKeF4le23
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 632 AcroRd32.exe 632 AcroRd32.exe 632 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a5d0436c518854f0e724d7162379738e_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:632