Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 23:09
Behavioral task
behavioral1
Sample
d73e7d35b89ffbd62ce88555634ced78_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d73e7d35b89ffbd62ce88555634ced78_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
d73e7d35b89ffbd62ce88555634ced78_JaffaCakes118.pdf
-
Size
76KB
-
MD5
d73e7d35b89ffbd62ce88555634ced78
-
SHA1
9dba811d7fa416391dd9b9bca38a7fa352f12664
-
SHA256
76c177da38ee65b2afde20301efb4e7938233fb497d0adb766b79714e5da4031
-
SHA512
d5abcbed0f93228a8a3d69f29295c7cab1c539ffe132c77d7942541c421c6f8cbeb5eabda81e9692a3a86111665590fc43054cc354747db637afec9b1bcc6328
-
SSDEEP
1536:E711+iufOPM3Xv3U+ogGEDCjxTtE+F5YtObWUpO7qWQ1kL2BeP7:8fufOPUXRoLcCjxTCG5YtOu76iqB6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2712 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2712 AcroRd32.exe 2712 AcroRd32.exe 2712 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d73e7d35b89ffbd62ce88555634ced78_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fb61acf7890b8403ed4e4f10296cab85
SHA1cd475a2e0dfd3f2413907b6bd0e52f5a2c7e5f13
SHA256a49e5a0110092a1972f18df319caab527920dfa6679b5f3f158a239736d61fdf
SHA512f212339fa4f47692be2e8f71ee48a28344b73c73a876a2016082d9ccb9b4e2e93d5b46834e9c75c1088f4fdc214dd77444ff15f8fb00f21ae512a686595b8f9c