Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 11:29
Behavioral task
behavioral1
Sample
da3ffed94df47275cb31d6611684cf56_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da3ffed94df47275cb31d6611684cf56_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
da3ffed94df47275cb31d6611684cf56_JaffaCakes118.pdf
-
Size
89KB
-
MD5
da3ffed94df47275cb31d6611684cf56
-
SHA1
fcfc95056ba093fbfc3747e558a5f79505380ca6
-
SHA256
4dadc6a17d90103de6fa1ba715cc9e88cd2b9c29344a0ff597a408aa41626b26
-
SHA512
c6af6335c881857e9f3caf500e01bbc8731b7d1e304cbdba9b24e9dd9ef8e05971a5d678c92757af5ee59b906652278ea80d73b9da2f0f0fe1eae75bd2a9f012
-
SSDEEP
1536:gatbI2CCuzGJStxeXbN2rA5CWzNwE4XsJUwGW2OGRRlXWEodrEBlu1WGpOGdCxBI:lVBSCJStxerNbT6bcZGvOeRlDoVEBIKm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2724 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2724 AcroRd32.exe 2724 AcroRd32.exe 2724 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\da3ffed94df47275cb31d6611684cf56_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5dfdfda5497bd0081c3b37207fc8f2b90
SHA1685c412b04dffd7dd2cd8671d814b7dadbe44923
SHA25608342ec6cc73e1d1808039ca3079e3c21f3a829e77d0259bb625ac6b577827b6
SHA5129c67cdce0129bdf99fa88cf9d4ced5791379aebc1ce44e4367cd390a32128bc3e351591e96ced4638cf7ff89a44f492472c6e150756e7f09f9bbb6e58f2c4acc