Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 00:52
Behavioral task
behavioral1
Sample
b189860847bf3b71992742a8750115dd_JaffaCakes118.pdf
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b189860847bf3b71992742a8750115dd_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
b189860847bf3b71992742a8750115dd_JaffaCakes118.pdf
-
Size
34KB
-
MD5
b189860847bf3b71992742a8750115dd
-
SHA1
a2fe153e528d9e79904832f18c6a2deaaffe0f46
-
SHA256
6cd5c91bb610f5adaa1c783d58c9cea81de0a812da06e6513a007f1afa40dc99
-
SHA512
16e7dbb17b755349dd439f98b717f68a1dc402c4278293561ce4512f4e671e171512a4045ae28aa1ccc2d7087370aff63760fc98f943f5dfd5c8329b51ccd773
-
SSDEEP
768:yfhRpPyhBPBsa1cKd8ol2HoXUw5E/J4GLJQkP1al7vaxSZmiuucst:yfhe51T8olU6yrLDP1aV5QiJcst
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2548 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2548 AcroRd32.exe 2548 AcroRd32.exe 2548 AcroRd32.exe 2548 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\b189860847bf3b71992742a8750115dd_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f748eec7e04e5174051bdfbd3de72eca
SHA19962a2c20e25e65cad9db66dd0cba71f45f8c808
SHA256808ad0bcb536d3f82ac5e4c435a7933baef7a91b5d9c7c410a4fef10a9efcdcc
SHA512645343eda0e4accbdad969d68b0d5d37c9549c49fc2579b77c5dfedc05586394a81c056b97ab1bc5d5b72c29c540ac0c865f1b59f38146e0d56c9f5eb3e85879