Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 01:23
Behavioral task
behavioral1
Sample
a90503f61b606bc8cd6460117a52ff56_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a90503f61b606bc8cd6460117a52ff56_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
a90503f61b606bc8cd6460117a52ff56_JaffaCakes118.pdf
-
Size
81KB
-
MD5
a90503f61b606bc8cd6460117a52ff56
-
SHA1
74a092656ca3dab6fa58f5f5d76a2e68928e2044
-
SHA256
8ce3010730735dd28d71e1977d213abf8e7741ae56732cc4c9c61866afbe4171
-
SHA512
c8cffc70b0b3a52a22a4e2502df5ce359334b32d980d227a5161ce78e7e2f8da45fad432926ab448093aa7b626bebe4c2774fc33ec8def1a984d1112b767522e
-
SSDEEP
1536:ZPWekFe9hcIeJyYweYMVGOu7X4euZnRZnH/VGENkLWQpOCoWUNnBgpQ/:lFkFKeJyYweYMVG/7EZRXTk2CkdBgO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 600 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 600 AcroRd32.exe 600 AcroRd32.exe 600 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a90503f61b606bc8cd6460117a52ff56_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5137354411f6854f31cceb314037b0c9a
SHA115fdb56079b15b6f44da2ea4e1bc511a415858c0
SHA256396a36750acb9a6c7772996e23088c6ba233b205a64637fb9c68186ad3db2040
SHA5126301e0a09c996f1b4275679e1c08ec7a9167969d73493546b4e16d180e5d5eef97c21892160c30efde5e25a4c1418fc15875cb2201a4572afa9f6861f4ab58a1