Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 00:49
Behavioral task
behavioral1
Sample
ce466439e8fcebf79a03d046631ced68_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce466439e8fcebf79a03d046631ced68_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
ce466439e8fcebf79a03d046631ced68_JaffaCakes118.pdf
-
Size
53KB
-
MD5
ce466439e8fcebf79a03d046631ced68
-
SHA1
c45b5770b53c19ad366df52d4e3932cfb94c9985
-
SHA256
114a9a9ff47ce8b50cb7303b4d051143dbb105b70275494bf2a05ebab0c7147e
-
SHA512
28241f5dcc485f7e049a9bfac3ba5b61dd3c646ad18f98d61df6310fd10c056fb747bbdc83eea4872bc10da9deba2089d9d860083da60ecbbba70d035906acf4
-
SSDEEP
1536:pGFBpHqLC6faxA7Ht7hgf4aHWlB+jZqhFna:8FBpHqLC6ueHVhyT2gZq2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3020 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3020 AcroRd32.exe 3020 AcroRd32.exe 3020 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ce466439e8fcebf79a03d046631ced68_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59676cad85b3164b97f51f8d4d1b4e67a
SHA1c1c3e3105de14462347a3b1dade6a194f987f4f8
SHA2569b9da2d0d9859d6258654f5dd4e46d7b1f7cf1715a80236ef562c305c543db62
SHA512fa9c2b82c0d7dd328debcec0eb34b3ca21c7dbc2e3dcb9f388bd4f581c1f5284e1c0dcdfcef5f6d3aa45318610e2a32aada6c096eb2d4e29d572b908ac5a837f