Analysis
-
max time kernel
94s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 15:57
Behavioral task
behavioral1
Sample
d24df284197bc523cedb96cfe258aa75_JaffaCakes118.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d24df284197bc523cedb96cfe258aa75_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
d24df284197bc523cedb96cfe258aa75_JaffaCakes118.pdf
-
Size
44KB
-
MD5
d24df284197bc523cedb96cfe258aa75
-
SHA1
1a5d2985700f39438d2560d657e7431b4fa86105
-
SHA256
329aba5cd2e79080030b975d1bbbabf13fdff7d2235120089d5de98e41c55c46
-
SHA512
f3e61e28f6fb14f74ffc6896103abec321aebe37666aa1c37d7237099dde4239e4d6cb7e1ed77c2504124bedbd20081b094fe7930fd5efb1aa4414c92d1ca03f
-
SSDEEP
768:Xxvcn4a2DNcm6gCm9fPzYZ0q0YpgQxyXK4o7DxvC0JcbUK0mRFhWlQUF2q:hW2BfNNPWqQK4C0JXv4FhWlQUQq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1856 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1856 AcroRd32.exe 1856 AcroRd32.exe 1856 AcroRd32.exe 1856 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d24df284197bc523cedb96cfe258aa75_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53545e5e7d88f7e5d8eb08e1ef9ec704c
SHA1d7471848ba6b509d76756d7cb4b15a219250341e
SHA2569b9d664bd994e031f5b7e55d834f8cfac47c7eec85a1b0890073ebcd1dc728ad
SHA5124fd56e603eb672717f4976f2a1330634991d50c4262cbb8844ad236b0bd5ceebf849f88806045753d91dadadaa8fdea6b0e4ff85ecea1e3127452e6d190b5762