Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 19:56
Behavioral task
behavioral1
Sample
d05864f620cbccda938c59a9f295918e_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d05864f620cbccda938c59a9f295918e_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
d05864f620cbccda938c59a9f295918e_JaffaCakes118.pdf
-
Size
130KB
-
MD5
d05864f620cbccda938c59a9f295918e
-
SHA1
67e7f0b8fa19d03db34d5248b3d5ad3016007099
-
SHA256
3b46cdb0293b0da484a6bfd5e9257a101b16c24d15cd9f0d068f75f1402e17b5
-
SHA512
55c2f6b98e3903b1fe2eb1b4cd832bc8dfd974c0c651c328a753dac68352b06c218c30cf0851edd0e363454ba89b762779744f113212bbb49f6c789160be3d15
-
SSDEEP
3072:4UUFfrlQY3fnCkol4OOwuVoxs0Q25Yw1M6VysGk:WrlQYKxehoxsm5Ywsk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2532 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2532 AcroRd32.exe 2532 AcroRd32.exe 2532 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d05864f620cbccda938c59a9f295918e_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c7de561c0677ac667a70363d98b5aebb
SHA1dc0f7ea829b996b5a863eb13389c5950a023a9e4
SHA2562ff2ecb5d76083f55dec7f2aeddaa7a6b7edf2dc0bf7537b229b934125204344
SHA512fb291a959fa2a901554cc2441bfb1e704cfad40823e96b4e98dc8f65d57232ae855d0f6299ac44185d2a87d24b10f9754f67cd330d0ec35b8af2b4f07c93b889