Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 04:07
Behavioral task
behavioral1
Sample
c2403dc08961de9198931621d35e1f38_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c2403dc08961de9198931621d35e1f38_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
c2403dc08961de9198931621d35e1f38_JaffaCakes118.pdf
-
Size
67KB
-
MD5
c2403dc08961de9198931621d35e1f38
-
SHA1
9c464f9eccace872f534c256b2bd215e413fcd97
-
SHA256
dac2ff100e751aa73e311afb9707f908093569bc0bb9e0b63491be8e0f77328e
-
SHA512
1b34401f6799bbecdba5727f642a12b1cf299cb395a5328c9f55afae9daa9d3661e79948b6b290d2e546aa890ab659c925731f70f37708385abaeab890266e5e
-
SSDEEP
1536:cGFopRfy6ErMM1rpzeeLc2tO6CR3bXZqfvNO2DSWi1B/GNqEeelZtFU:5FopRfyP8zR6CQiv/AqEegZw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2260 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2260 AcroRd32.exe 2260 AcroRd32.exe 2260 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\c2403dc08961de9198931621d35e1f38_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD579e1d21aff5726f2459df82ef73e4a81
SHA153b8d4083269f1f7332faf25bbeef43dfb906fcd
SHA256f73c9158d8a857b6514054bfbf62d4e3b5bffacf035cfc977467367b9e3578b9
SHA512ad0468004249020891ef4a1b8da3b002c76c9cea4e4c0108037423a8c9b244264bba91f894abb0610e6f09f5c6c5d48691492183566452517e67ec1b30b97efa