Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 08:25
Behavioral task
behavioral1
Sample
b6f83bb363c816303612e925aabf5cd0_JaffaCakes118.pdf
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b6f83bb363c816303612e925aabf5cd0_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
b6f83bb363c816303612e925aabf5cd0_JaffaCakes118.pdf
-
Size
74KB
-
MD5
b6f83bb363c816303612e925aabf5cd0
-
SHA1
905c1c9adb9bbb8cc22bd264e24f6be56dd3b1a5
-
SHA256
eca54f60b25794af14721edd3d94dea89a9cf9a0d442871d1d890c90aa84626c
-
SHA512
c1098c0a63778d1efcc26357d579be49751a21655c05029f8d0fb757076f44a203b0ff9a489c4092552ed7258da4a774128049020ed19ce7cc9ac798ebc2afb6
-
SSDEEP
1536:KYPlHQuyDpNYOSrOfVg9uyvfEyWRzUvWXf5SNRwGswrAWApO6UEX:lKuoVgTvfE/zdhywGv/6P
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2692 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2692 AcroRd32.exe 2692 AcroRd32.exe 2692 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\b6f83bb363c816303612e925aabf5cd0_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD534ee538eb83a95439d9b84d02c13ad6e
SHA1296d607d7a5abae70c1587d0e29202ff4814c009
SHA256bc72f37180af3ad07914c98c316854a89be2f1827bc9d791e7ffa8ec58bae30d
SHA512fe6f35bf58b781b20eefd51e13a0b2358754a460023854279d50a8bce304978a21f3985cd9153b016e6bb4666ca7679ce8d101cdc99c31d9ce4f07aacab58f18