Analysis
-
max time kernel
96s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 15:23
Behavioral task
behavioral1
Sample
a72cd9acd9129ff8bfdb0b36a107a278_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a72cd9acd9129ff8bfdb0b36a107a278_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
a72cd9acd9129ff8bfdb0b36a107a278_JaffaCakes118.pdf
-
Size
115KB
-
MD5
a72cd9acd9129ff8bfdb0b36a107a278
-
SHA1
1ca5dea03144b2c311e0822df698afa89089fd0b
-
SHA256
a61130574ea0550034399559857f8309be048b655d72eeec260bca991a1c308e
-
SHA512
e2d167ff1cb20d2699166d099b7522513d9a0858c69b9afb918908c48ea26bb1700a700c30ae1a09b7890c6354086cf69295b7e0f28463ea7a90b1f9dfcdd18a
-
SSDEEP
3072:Bh2ylErwerJAILuUxsNF8pIUjrvGeRERL9fp8Z9Z:Bzxel5uUxs0pIU/feHW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2528 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a72cd9acd9129ff8bfdb0b36a107a278_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57882d961cab5aa0a41d8697e325870e1
SHA194ab8836d26951c4f50545b8727d101000cb294a
SHA2562e04fec745192828f4123fc62021f56509326a9cd6e5352331da07308f4fae54
SHA512233849c78aa21f125b25ae5b5697dee3be34d188cdccb28b7c6f9aad8b53d7ad32e7ae895780e2148e5c96c28f663ea03fb928d4e69c75999b895c4bc572f1f6