Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 10:17
Behavioral task
behavioral1
Sample
a6645c57ab00a5890f650ccd3aa4e1b2_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a6645c57ab00a5890f650ccd3aa4e1b2_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
a6645c57ab00a5890f650ccd3aa4e1b2_JaffaCakes118.pdf
-
Size
384KB
-
MD5
a6645c57ab00a5890f650ccd3aa4e1b2
-
SHA1
56b641b879f99c22838634ab327ac37e00d2961f
-
SHA256
bb04534cc068b78316c1871c4344728ed6fc9013a62909fbfe9610dbed123419
-
SHA512
6496f6879c9035fadd84a73ee32aa284b82e353c171eaf11d84a8cc1938037feb02f1d5ffc01f19d21224957edf440b9072c4457d421fe46dfd3a269768c7b42
-
SSDEEP
6144:NiIRSnfPChHQL8PpbRebHvLlliKVYmzoXtH98YUb1j+:NlRAChHBPpbRADlEKVYmzktH9xk+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1884 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a6645c57ab00a5890f650ccd3aa4e1b2_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5485206e677e274fe3e58f0f1f3771e57
SHA176992abdb726bab43cf73ddf12cf6c385add0337
SHA256fc13e6879fed7396ccff27b6465c9c6dfa3127222e78aa2b334562ca5cc446a9
SHA51209f738b37ea47e77132f6e808ec428dc9cd2adeb3123934dc197e760d0831ee62bea2c6e72a111006f2d56fd4454c31344e6345fb00eb07141a2f0693e79f931