Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 13:21
Behavioral task
behavioral1
Sample
c0d50b227f78fbb955341883a64fa77e_JaffaCakes118.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c0d50b227f78fbb955341883a64fa77e_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
c0d50b227f78fbb955341883a64fa77e_JaffaCakes118.pdf
-
Size
57KB
-
MD5
c0d50b227f78fbb955341883a64fa77e
-
SHA1
e33f91b8c1c5d046acc2d7d91a7cf0045f7c4e2c
-
SHA256
e9797f98ddc00caeb7852c29f9a656d2d24a7be5ae6b3fc56b78912a2a2bb58d
-
SHA512
b891f0d360aeb902aeae452cd92d8ee0463f3b5f6f081b1f99a7bc8c1bc46e096369df540e72810b2e9d87d10dcd69de41164533dd70500e0d39f47388f40cd7
-
SSDEEP
1536:tGFjehLJ6i97q7bF44x5z8u0vZiCc3x+EgNgcVLE:wFjeRabFF0Rk3x+EgN5VY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2076 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2076 AcroRd32.exe 2076 AcroRd32.exe 2076 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\c0d50b227f78fbb955341883a64fa77e_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51368ae298ab3e6c05f87f7d91ee54676
SHA10fae01086335a4cf4a759fb9c66bf88c05476de7
SHA256d4120ef8893af3ed9871fb0fddf6a2cfbae1046417d90e6446cccaeb8164f6b8
SHA51265a52ca06039cb6748111d7e286c2d6b4ca0fa46d961e4d6b7c5eca0b80d8e62024470af2d0266d73716aae12c7c04fe6ca6f4d4d971b12901bb8f2da734b797