Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-09-2024 21:32
Behavioral task
behavioral1
Sample
d51f0d420c31803af9cece859b9ed548_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d51f0d420c31803af9cece859b9ed548_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
d51f0d420c31803af9cece859b9ed548_JaffaCakes118.pdf
-
Size
358KB
-
MD5
d51f0d420c31803af9cece859b9ed548
-
SHA1
0a59815e495f6932fb5c59a62448acb5f75c8fb5
-
SHA256
6d9d5a65ee24064e5330c08dae523e3287964d122f53833088999c22c5d75973
-
SHA512
5780e521eee5abe9bf49ccd930ff2535af7b5cadc88e2988522a57422f45b00f037a5bc081fcdd935f4089a78aa9296564ae68d789a4c58abd37ee1fad142ad3
-
SSDEEP
6144:k4s+fE+PjRDkadYtuxrCnZ8lM7xQwr6YR32cxAYkYWJeprG6dt30zeKJl:4+fT5xYugZ8a7xye+YWJepbdOP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1508 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d51f0d420c31803af9cece859b9ed548_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a6c17dd2da7abd089aa87129b306ed29
SHA1f9f0259a7cecce9b1cb8a0457f6ac81985c0905c
SHA256c6f2bd21ffbffec754c675d16f8b8191b08f2e6ca4678e1d8393acb01165c0af
SHA5125b03b3f8d2d4900e51a2780ff3ef88b1b9d689730dc72702a021139f7db624682017ba08d328a56fe615a50c189a34f9bb935e54e5dd4d36ae860858147d2d67