Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 19:40
Behavioral task
behavioral1
Sample
db176bb03c85555d04b35e0a6bea7f66_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
db176bb03c85555d04b35e0a6bea7f66_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
db176bb03c85555d04b35e0a6bea7f66_JaffaCakes118.pdf
-
Size
12KB
-
MD5
db176bb03c85555d04b35e0a6bea7f66
-
SHA1
78bcb6304d2ca799b59605b999a7bf756dca4f85
-
SHA256
31b88e0200f4431a53e09ac87c59bde013e6bd58504e0b4cb42a66483b748e4f
-
SHA512
3112d421a770ad0130cc10bcfdb9841fb3ce8ddb4903b6ae2d2b75b36275cef491c9c01ab011a1ded935805e93b0ed25603cddaf1859ab58db4acce170a6887d
-
SSDEEP
192:WJNWxR4+/GTPmHtLPU/qPDMp4MGqyJf7J7dN7lZV+C+oUN2F5MfZQw+JpD73ndBA:W3AGTPytYCP/q6f7VdDZVeNNORnDw3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3056 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3056 AcroRd32.exe 3056 AcroRd32.exe 3056 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\db176bb03c85555d04b35e0a6bea7f66_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59728af0f0a7992b5e19afa2e0f07cd4a
SHA1494df296c39a97c2df332aac7075b2f92efdf4cc
SHA256e2daeab4f7ec195b8d4f4a890b94f76cb3b47aa59837f1b559c450b303235bb6
SHA512b7ea5ea2603e6ddc255b86b113a02aa03656e31821a5627f80b013879d527b8518c278144f08599c46e4044b8a50646ed9190e405366ff72b0c6793b312565ca