Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 03:43
Behavioral task
behavioral1
Sample
a972fa8d9c590bf4d667c2b90e8735b2_JaffaCakes118.pdf
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a972fa8d9c590bf4d667c2b90e8735b2_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
a972fa8d9c590bf4d667c2b90e8735b2_JaffaCakes118.pdf
-
Size
80KB
-
MD5
a972fa8d9c590bf4d667c2b90e8735b2
-
SHA1
c892e443f39738c573cc9091a5b546729506366a
-
SHA256
5ceedac58859aee75480f5174ad0e24ec9dcbc24bdff2cd1dbb190eac37a862c
-
SHA512
c95fdc5444d99d030f5f98fa1a1587dec90603c042dfd33d8024c57a9194a18bdd8a8a4e1460c6be7f71a9ae5e275b2f939a1a9ff7edf18205fc01b832a6bef0
-
SSDEEP
1536:espJWAH78Iwewxmv5QS5rmek7fVHDKS1OrjvhKZ+b+pNgQYcs:Bpri8BPqztBQP5D+pNDI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2536 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2536 AcroRd32.exe 2536 AcroRd32.exe 2536 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a972fa8d9c590bf4d667c2b90e8735b2_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53d557020135a23b978428bce5e4b839e
SHA16eebc7e0b7b7643ad68d1e1f527b9417af63aa9d
SHA2561fd7a7e4af12da3594f4c7d06e88fa0e7aaada3680960e85211d8d999e662b3d
SHA5127a91ded9706ffc3ecd605758ecaae31b6f13b24b74a1bdf7890882ec0bcbb54b47b9f41e0dd1ca51fa534c14f7c114ecbdad871cae00c75203c129c508c9bd9d