Analysis
-
max time kernel
95s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 15:15
Behavioral task
behavioral1
Sample
afbdab342bbb16d2cb9b8fc74fd46a41_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
afbdab342bbb16d2cb9b8fc74fd46a41_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
afbdab342bbb16d2cb9b8fc74fd46a41_JaffaCakes118.pdf
-
Size
80KB
-
MD5
afbdab342bbb16d2cb9b8fc74fd46a41
-
SHA1
e04bee365588dfd53647a6ceabc8c1e96532060e
-
SHA256
fdb9c8752227c6f3c750554fd88d2db131d05441b9480ba987acf1935d73f47f
-
SHA512
04ab2e8d329875cda8afc350f11e60837ed9d5c3be7dc2dd24fe98bcf573620fbdf26b244d6f79ca62cbdfc41dd8623881910c9567944a676c440477aafbeb5f
-
SSDEEP
1536:MIQz4HplJ6yoJnOQdWZnQZCDjj/CWzEb58cWypOlWWxlSyThTJ5h2bsx:vQUHplJ6DJn0ZnhD3/JzEIlDlblJL2O
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 708 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 708 AcroRd32.exe 708 AcroRd32.exe 708 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\afbdab342bbb16d2cb9b8fc74fd46a41_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e204d9246aff4d4bbfec4074f6544a1e
SHA1bd871e38eaee35b7975794bec537ba5e412de48d
SHA256aa59b690ad3ac96316fedcf9b2345260d8d7f521f45c62e6ae2c99ccbc96d271
SHA512c7b4a6fd86244e31741f2bac51957ddc93dca0756b4885b7f1f5b43853272769381c0136045d1500d30283cc2e4be6b75023821bc288bdb25af5f8d70c267783