Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 16:16
Behavioral task
behavioral1
Sample
d6ad30dde9c07121092e489e576ea7bc_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6ad30dde9c07121092e489e576ea7bc_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
d6ad30dde9c07121092e489e576ea7bc_JaffaCakes118.pdf
-
Size
80KB
-
MD5
d6ad30dde9c07121092e489e576ea7bc
-
SHA1
b0f0575cf203166f993579231d5fa16ae4d522be
-
SHA256
9f9a3031f6d3bd04a04fec43a07115a90b0a13aac882bebad9add6e933221c02
-
SHA512
b8ce4e778455a939b483a0d1a8144bdb3ef28251eb42c211fd5aa1b756592bbae17e09ea2911bded019bf33f7cbe6a3ba313aa3d6e8da2881e89fb4d963d614c
-
SSDEEP
1536:5KgfA5QfGUs3++xsk+eihjMQngmXc9PgSbTWOpOaZFFWshpWNEXBspejj:LfA5Ow+ZzMQng0c5kaZjgC+pm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2192 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2192 AcroRd32.exe 2192 AcroRd32.exe 2192 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d6ad30dde9c07121092e489e576ea7bc_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD516cdd0a193972b5dd4d965777de568d8
SHA1552e65e0ef853142129546dde699f1f33bfe4090
SHA256dabb8ba78a0cb0420d5fb3611ccca17c63c84ac2e68ccc84a318ede4f9f32e29
SHA5120900586c8f00a839a26dec931db0d66ba8eef8eaffe6a49837ad54c57ea1fa07efb58b5f618a8a49b3106ed69e9f6a012780e421094582e744ad38d16d4cc101