Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 14:21
Behavioral task
behavioral1
Sample
a6fde916e1fb8287aaac675920c80cc9_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a6fde916e1fb8287aaac675920c80cc9_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
a6fde916e1fb8287aaac675920c80cc9_JaffaCakes118.pdf
-
Size
13KB
-
MD5
a6fde916e1fb8287aaac675920c80cc9
-
SHA1
747cb3d7e72feba3602d3fe27ede2ca59d43317b
-
SHA256
37d171d0f8414124e20e4be7835ce0dce3b69c9d0c93ceb2555294fbb6a769e8
-
SHA512
7c690ac129e7b1bb48a68188a5b7fbace51423c8f7774f5b515bf97f7db64273e8b9373b0306bf764f9f7ab6cee0765c4a435f016a926dcb24ba7b11576a49eb
-
SSDEEP
384:VzPUgi9wc8MIijHxhK5Op3DC25q1SLGd6O/D0AvMP9YbQ/V6Bdgy:VzPHtDijHxhyOp3e25q1SLGd6O7TEP9W
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2292 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2292 AcroRd32.exe 2292 AcroRd32.exe 2292 AcroRd32.exe 2292 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a6fde916e1fb8287aaac675920c80cc9_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58f8d7e5f4b920dcf215e4ca97acfd7dc
SHA148ea0d9bf07b7098c3fdbc1b252f368e311b28e2
SHA25644b52f29e7e33c61e116cbd85a845e7efd0e2a7a971e2c359f62eb90a6650b12
SHA512ea27365056a749f920360c2678eaa8ddae8d2c7fabe4e2efdd5a0815ab7e4ade1e396adb34e27f237dfa2bc014d5625f5e1751705b3e957eddf8eb82c6adfc2d