Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 00:10
Behavioral task
behavioral1
Sample
a8ca4c7a70a5dbc4d7af4ea32916ff80_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a8ca4c7a70a5dbc4d7af4ea32916ff80_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
a8ca4c7a70a5dbc4d7af4ea32916ff80_JaffaCakes118.pdf
-
Size
24KB
-
MD5
a8ca4c7a70a5dbc4d7af4ea32916ff80
-
SHA1
0b483369f40588d3ff1995c96ab58433ed4cb20f
-
SHA256
22778dbfe34326422f72f055601fb9fb475f4e02f39b3ec4bd02912455e8a92a
-
SHA512
a23f3d0f49377be0a4ecb22ec587454e7807bc9f3cd1b53c0c4305e1ab52b5838a789fc995fc593cf8f0e86e62201fad4bc2fae7191fbcda183355dd1b28dc19
-
SSDEEP
96:WEDsNyvV0c645vFB+OlybcxMFizBQoSMFizBQof3KrOLJnVDceQj2KnSnZ1WjnYg:WysNAbl6y1yVYyCi62tinRBA49NP4X+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2632 AcroRd32.exe 2632 AcroRd32.exe 2632 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a8ca4c7a70a5dbc4d7af4ea32916ff80_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2632