Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 01:14
Behavioral task
behavioral1
Sample
b1998dd6b6d52b7c64e348f1df4ee8ed_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b1998dd6b6d52b7c64e348f1df4ee8ed_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
b1998dd6b6d52b7c64e348f1df4ee8ed_JaffaCakes118.pdf
-
Size
49KB
-
MD5
b1998dd6b6d52b7c64e348f1df4ee8ed
-
SHA1
297c9a7079f1713a8b03768a9a63d9934be7dcee
-
SHA256
47b043e7150dbb17d431f5e081ae9814cbca68aa1482f1eec27f8487febd8b06
-
SHA512
b31d7d9a4d399e87d0271f31bcb926aeaa556ea990d94fc2ddfbb7fc0b22da0a441a2e16173922ca844982c61907f7c54f73b772c51acd0a13854bc52e326f26
-
SSDEEP
1536:EilHDOgDTKp6HH/V78rp02YJKp/beBRTXCP9Hkeyx39129UKoqHqKhyoMgKzm+8U:tDOgDTy6Hf+i2YJ84TUSNBjyjXK2HpEx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2264 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2264 AcroRd32.exe 2264 AcroRd32.exe 2264 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\b1998dd6b6d52b7c64e348f1df4ee8ed_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ced9ffd629fa122e160d99e73f5d259e
SHA1ce79034cb54808e1ce1cde0bf5fe411fbda7d4b4
SHA25658edf54af5ac36e082a001b1b689099c7edf81365db4bb38b422ea88179552ec
SHA5120e21f1d1290526464256174aa6f885e54a7cb54b7067a8c45408064551cc5742fbaaa7c0eba027035f1578810d9b72e4f165f967a16ca1e5005cb5cd9aa7aba2