Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 08:42
Behavioral task
behavioral1
Sample
d5f922206cc2ed066da6f6692e866da4_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d5f922206cc2ed066da6f6692e866da4_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
d5f922206cc2ed066da6f6692e866da4_JaffaCakes118.pdf
-
Size
78KB
-
MD5
d5f922206cc2ed066da6f6692e866da4
-
SHA1
c20a037ef8f496877051231f77fcfb892cc1e182
-
SHA256
f479f698da7e0940a49a7c288d646e351383377c71d420bbe6f0a0f63eb36dae
-
SHA512
b2bd830321fc68ba903197cd42b36a06ca1f0762543e790998f0ff4cae697988aa98ae500c5d78e4eb62cebbf5137fc203bf846a231e1d132b60db7c535c53ab
-
SSDEEP
1536:yV9799PJbHurWT2J6v2hRji89IwdKIW6kJTUkMQWwpOS4/h41d3HdQ:G7zxLuVBHiEdKquUkMfS4/h4/K
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2520 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d5f922206cc2ed066da6f6692e866da4_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51cc933b990a1b1e5f91a7c988374b99a
SHA1087790d47e1ad223ab330960ddc7b4d444ff42c2
SHA25600b249f520ecc92c58667f01c7ec62b2bc29b3949d8be9b8abc79e04053e6e9e
SHA512984dc7898989cb600c7a7bc183672e6201f845e7e9456cbfdb49fc95086ba47c8ec295478ff946377b82268ad0a0ec9601df6baea323e3e928f8d1e9a94453be