Analysis
-
max time kernel
94s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/08/2024, 18:13
Behavioral task
behavioral1
Sample
c7625408bdc14bed6cf3b94a1c83a67b_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c7625408bdc14bed6cf3b94a1c83a67b_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
c7625408bdc14bed6cf3b94a1c83a67b_JaffaCakes118.pdf
-
Size
89KB
-
MD5
c7625408bdc14bed6cf3b94a1c83a67b
-
SHA1
66c5bd13b7b4fe2f8065818dcf68fad39e5411d9
-
SHA256
42a30178c8dcf786cf36fa4d368da78400b2268c7ae92e03b5506d4cb13055ef
-
SHA512
ec044fc832baa5d668e5714ee863265c67ca668a170b2fb29a1d189b33660a0df3242ddea680840123e7bb270b0e4acb2affd85e0b1753af5d6b433dc75c5b5b
-
SSDEEP
1536:Oe1IF5B212Dc4aKFOjdKCGZ96sJ9EsDglSFuJmYw0Xh2LiSXm6WUpO7qWh3OawoO:p1IcaXIcCG7lJWsDwSumYw0XhAmV7j3u
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2024 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2024 AcroRd32.exe 2024 AcroRd32.exe 2024 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\c7625408bdc14bed6cf3b94a1c83a67b_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5134dc9d5a9cc0d02faa5993fb584ac6a
SHA1cbbdc167639c04e41295c8f74124740bae43eb7c
SHA25653dc06c6b3b565b4c9ccef25c33294a58c3aa6197c84948d49d1acfe3ebb052f
SHA512f44ed31995bd7843ffbb847dac0d6899c41d06f6a5d65e592e8e58a63248ae291f6c52a47314fe41bee5ea51b2af1916684dfa2a3d292500add872ea05acc60e