Analysis
-
max time kernel
94s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 22:44
Behavioral task
behavioral1
Sample
bf931948fa79d605e2c450f50b8f2def_JaffaCakes118.pdf
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bf931948fa79d605e2c450f50b8f2def_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
bf931948fa79d605e2c450f50b8f2def_JaffaCakes118.pdf
-
Size
84KB
-
MD5
bf931948fa79d605e2c450f50b8f2def
-
SHA1
1d530017a9e010c0abdefa7f8e33c9321df15553
-
SHA256
b25e7667521bde13f7f3c8da40efa226d0543e2de934dcd49e072a8838ed195d
-
SHA512
1f0e1e573bc76de5618a29bd7c3a5cdabb0ed5c817290678b63e39a2f58cca570da16eeaa779af00e99137620952dc9348b8deb086cf33d4f69b6bb4a87f3246
-
SSDEEP
1536:3ChOSnU6D8XuNI4uyAKD658ckY81a++z+pWQpOCdrzNM/WxicKzD26:nJ6De9hyjD65rkY8192+ACdrRMLX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 580 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 580 AcroRd32.exe 580 AcroRd32.exe 580 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bf931948fa79d605e2c450f50b8f2def_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51e87527ec8994f0d4c099cce0b4c7e2d
SHA1b80e28e28aa562dfa21b32898bcc00d9a3d79db2
SHA256dad494445f45b52f9891683bb4fdd2a5af4af9804c25fe625851b7f151c11034
SHA512e4bacc45427910a0c5129c487d1cd683b1c139aad6335413e84c1ed3f069c6827d4cddb1fced6b6d1786edcde7e5b2c64234f130446d1480bb10a64993e8341c