Analysis
-
max time kernel
94s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 12:36
Behavioral task
behavioral1
Sample
dc4c8aefaf85ed974beec524f9823971_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dc4c8aefaf85ed974beec524f9823971_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
dc4c8aefaf85ed974beec524f9823971_JaffaCakes118.pdf
-
Size
83KB
-
MD5
dc4c8aefaf85ed974beec524f9823971
-
SHA1
4d760cc9947efa8b6d3a23ddde201aed0e41c540
-
SHA256
1fd44a8bf05c1df0afbe014b696105f6c05946399f048647def54c94f50f8a5c
-
SHA512
773c99f8901aad2fafe3624359a2f415d2b8ea50cacbfe49a3b6bed8774f16cbb4b4c2b88357459f23b0271821f179184343334b43a07a73b0de8020f9b9d49b
-
SSDEEP
1536:DrmjapaaGyGRuz8pncMwsoxdjrJ0A1ppdPWE1W1RgqMyZWbpONNhjyH:vmuXIRuIcMwso3jrJ0cjpgRYybNbi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2380 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2380 AcroRd32.exe 2380 AcroRd32.exe 2380 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\dc4c8aefaf85ed974beec524f9823971_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50808901514a40b737e6cd014fb6aa318
SHA123218ebd5c26a7a8c9706195d477d7d825236409
SHA25689ec53a6381851a0e799890134db09dada1827e14e0bccc25ab9fdef0d2817cc
SHA5129fb92229a8d659905e68b098c4f8f83348c8e55ba1251cc810d95fca0204c864f898e2fb48649f10bb498ab4e6060c809be1ce4cb135a999fc67cb17f3a6904a