Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 10:09
Behavioral task
behavioral1
Sample
c082169100586ef34962afaaf07d80e0_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c082169100586ef34962afaaf07d80e0_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
c082169100586ef34962afaaf07d80e0_JaffaCakes118.pdf
-
Size
82KB
-
MD5
c082169100586ef34962afaaf07d80e0
-
SHA1
bbb08db62cd9a7e47b7e4c2f013cdd5cf1948e3f
-
SHA256
937ce4d63aa25fdb2a4d902e859eed07c8e1969de1de12935e3e6d914b3316c9
-
SHA512
a0a6c6133588a65f73f4cb2952eedc8231aa9949a1ab55b85ca1e7080d4957eedd2b441980898b49ec57afe5a468c45736a343c1c367ed8def83b68a38e6a7e9
-
SSDEEP
1536:q/W5E+ZTMeW361WocIfLItqpLG92qc6C9T4OouIYAW6pOu26WbaYHw17Kd3F:UW5E6s61WIjItQLG92qcl14TBqu2a1mj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1904 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1904 AcroRd32.exe 1904 AcroRd32.exe 1904 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\c082169100586ef34962afaaf07d80e0_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58bfcaf51461c0a477ac277b20b77944c
SHA1da75b7c340f031651f6f87ae120a9883894b9f7d
SHA256e7655300b86e67d70d5f5bb024c9104319bee4672db412db00a03af0611d871f
SHA512d25b613dce3f5b57cb9fc682436e98bde90dc72257295c56c747a0c36430a4c90ce3223d6ac913ea96b027b49f8ddde3f85e42f89bcb6d1206f9d3d7b89b2454