Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 08:20
Behavioral task
behavioral1
Sample
a60d528060ce6aa41bef2be0940dcfce_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a60d528060ce6aa41bef2be0940dcfce_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
a60d528060ce6aa41bef2be0940dcfce_JaffaCakes118.pdf
-
Size
9KB
-
MD5
a60d528060ce6aa41bef2be0940dcfce
-
SHA1
9c757eec25550123eca9320e8bd66fdbb98f64e6
-
SHA256
57b0fb4e4e087d9a5b32d1a674fe7838e5eab99bd887fe28de8594b12bcb35f4
-
SHA512
2ac7e5979f992a27b456f45373a4491a88916f77293eafbb49ee473f74ca8e1855a8c4dddd4ffe74eab382dcf9f1c0ee800e8efafd7b760528fed02303d14fa0
-
SSDEEP
192:lPz4ULMxLIKXHsfyxjsz5oGA3Ry/yELjHcYdnE7AKC8IV2+e6PCykCl:lPz4ULMxLIKXHsfCjg/PLNyqxe6PCykE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2236 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2236 AcroRd32.exe 2236 AcroRd32.exe 2236 AcroRd32.exe 2236 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a60d528060ce6aa41bef2be0940dcfce_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f8c8ab26d58c2ed52547d8370c9ac133
SHA17047f7f934499dc26dea428d2d59c6bcfd9951b7
SHA256c232022d75b18bc4b7e97329b53a4d5ea48358e45ae300e3dade5d176672ab41
SHA5124fbf8b2e086e5874d815fa9c2397abf34fa428df7883b9b69340cb83a278f2d3971b9bba30a159ac84cf60d29d5524a919f5bd07fca79471001fe7367b3645c5