Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 07:05
Behavioral task
behavioral1
Sample
c034804032f1e61b82ee8ceea2238b73_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c034804032f1e61b82ee8ceea2238b73_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
c034804032f1e61b82ee8ceea2238b73_JaffaCakes118.pdf
-
Size
8KB
-
MD5
c034804032f1e61b82ee8ceea2238b73
-
SHA1
c35cd7842e3c1df6976a98e02d3359a6083a3fd3
-
SHA256
e1c46b46bc149a8f426453ec25991e1d616a3db7390a273bc404e01310765541
-
SHA512
cf95b4c64f8b6054a7b95913cc49f4b6aef38f87a13f1295f716233c3e7a5dc50b7d24f6a40f87ee016e0c6c5adfa8e55d42280aa6345dffc3adfeeab89a2b7e
-
SSDEEP
192:zP5uFm4k1W+VI5d+d5TGzk98zLstGJORnCPJCu5D8txlV9YV:zP5uFm4ku5dO6z30tcCu5otxlLYV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2540 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2540 AcroRd32.exe 2540 AcroRd32.exe 2540 AcroRd32.exe 2540 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\c034804032f1e61b82ee8ceea2238b73_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD566a1f2c215776873332269330ec21609
SHA113e5c77ff0731cf964f20fb403cb1ba38e421624
SHA25621357b8fbc70d680cc59cfe736a7a9a2590eabe880f10db436b9bc9fe7cd0091
SHA51297b8b66c7f8666ee30c9880057cfdc53b21bf8821fd02ffbdd45b5f89e95ab3ad4ad0c2f139207888e875a28624a27a8893ef840fbad99bd0dbc0cac32bdadb1