Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 10:01
Behavioral task
behavioral1
Sample
cf491a30440fefb4c1da5fef181e240f_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf491a30440fefb4c1da5fef181e240f_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
cf491a30440fefb4c1da5fef181e240f_JaffaCakes118.pdf
-
Size
51KB
-
MD5
cf491a30440fefb4c1da5fef181e240f
-
SHA1
39ed7c55cd98d765690063d431490a3dd267fe26
-
SHA256
683093f59250feeb8eabd80d21197f5691b739819885efdce4d35c6f2abd87ad
-
SHA512
48480a9dc3229010c2bcf28e142f122fe1317cb6d8d8bbc1e9975585fc72769bc9efbcb48826c8968c4b3e11634717842bd3b5da8d5634b04e78616d1719a003
-
SSDEEP
1536:vXGFmaxCW8SAYC9kMU5axr05nGvcLv6bEXK:v2Fmq8Vn6p4xw8Mv6bF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1660 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1660 AcroRd32.exe 1660 AcroRd32.exe 1660 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\cf491a30440fefb4c1da5fef181e240f_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a9afa0a3a074d2b9bd320e80497219fc
SHA19c17dd956788c1b393508b6b8c42dd656c48e73a
SHA25633481567b845fb46e5207603941c69020b370225fc20c922690c872f50baadc0
SHA51256b613c08547e271f29dc1a6f61c52f4f7bdf6790c421496319037b8d303ffb29fe72705a93f948dbbd98859c3f7571dd5fe8aef6ee2217b43cf3be11dc2d873