Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 11:24
Behavioral task
behavioral1
Sample
bb874edb4473e027af8bef414a0a9b16_JaffaCakes118.pdf
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bb874edb4473e027af8bef414a0a9b16_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
bb874edb4473e027af8bef414a0a9b16_JaffaCakes118.pdf
-
Size
80KB
-
MD5
bb874edb4473e027af8bef414a0a9b16
-
SHA1
665b35915ab9695c8390e3987e43d2bf48caa089
-
SHA256
b8d474245a8ea2a399a481e42fd0f8325ac03e97b97fb9fcd474ff623250623b
-
SHA512
ef3486420084504f295d01f810eb03dc8d46461763dcca67b808309f790e071d7a23a684aaca75cdc2b7ebb886295e64e4f5dd167bd5738edd5ef02b3813bd3b
-
SSDEEP
1536:cbJuyWNyGbXyI8J3DNbZ/ErrQhXZWYpO2RiH7zg6WysvSwsLfz7A:mJuF/+IeDNZ/EsA28H7zgBuLfA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2140 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2140 AcroRd32.exe 2140 AcroRd32.exe 2140 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bb874edb4473e027af8bef414a0a9b16_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56fc71337bb6336a940b1df0a88a6bf89
SHA1cef6436660b93ebad05671034b7ec1fa37b282ee
SHA256d946629aefe2fa31b11029914d8ecb040e25675153986322b7581f049a5a5792
SHA5122f645601ec9867cee9d84affdd9d1c0dc24bb87152941ab8242d541c2952f7278e635454e2e709339f6f9d9f33a73dce4a11285e8155893794871bf1caf060f8