Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 09:20
Behavioral task
behavioral1
Sample
c06d095a1a19426e435d91faea73c382_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c06d095a1a19426e435d91faea73c382_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
c06d095a1a19426e435d91faea73c382_JaffaCakes118.pdf
-
Size
46KB
-
MD5
c06d095a1a19426e435d91faea73c382
-
SHA1
4e9a454f48682e09d92c41c8cf2b5dd9d5d64b68
-
SHA256
2354ca9f698ec91edc1ffb35bb6ab299a4e389b0399d0346965951feb25bf22b
-
SHA512
263d74e0216dbd19f6332a4e56dea801d6302b7d9c92fad8cecf6f673807afc7b8096d06b5db4109796b55176e35721e16981828a4511a42d4ff3008e4aa2af5
-
SSDEEP
768:ogGzpDAnkFliG7XwNeMmx9nT9y/ujc+ulGGJ99WGTn3neqrxMyC4zd2gbdVQ441j:lGF8kXiG7Imx9A/4wAG8GT3eMx84zosc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1056 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\c06d095a1a19426e435d91faea73c382_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a58425686c05521ab975d634a7380e3e
SHA12b8e38cba2d2bd8eab64683c71a952b08d1f8137
SHA2560f7a6857dfabdee5c5b93424ae57179bbb7af27b9bc490c62653ed0826009693
SHA512e45f5960e21cdcd8cf2395b850c5b5fb84b55e38a6fb34ea3b21b82f9aefcf17efd31988082b9c74f49816e19c0bd7f63a6a989cfc6e495c4615f8369acf7f01