Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 21:50
Behavioral task
behavioral1
Sample
def6c9e41490f79b32ff056d320ce51e_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
def6c9e41490f79b32ff056d320ce51e_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
def6c9e41490f79b32ff056d320ce51e_JaffaCakes118.pdf
-
Size
47KB
-
MD5
def6c9e41490f79b32ff056d320ce51e
-
SHA1
84776b98195a5edabacfbf36a6059ffb7c828398
-
SHA256
909055a38002a7b27064ea4547babec92b7d1eb43c59ed40e79ee3c54ca621bb
-
SHA512
2ad21aa52ebb1070ea2c8ac6c177cb997ad694d2ff955fa356f39bda15db91a482eb2c52558f60f67726a8a67cc4adef5671cd9e1ea841083cebcf421d26fa4c
-
SSDEEP
768:2gGzpDyBVksi8yXyit0MyBaAb/OeCZoLYKMZPtvwUr6WUk+Y8CMAVacMJur2sX:jGFmpi4ROea/lUk4ZHTJur2sX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3048 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3048 AcroRd32.exe 3048 AcroRd32.exe 3048 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\def6c9e41490f79b32ff056d320ce51e_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bd63f21456caf30aece6ffd81e6ab071
SHA1f6e47e8155cc3063950bec5407e4d0bd3d58b23f
SHA25623e018eaf6597731b9db040e8fa89c897b53182bf84a23b417526731b675f7b0
SHA5122335df4fba7f3475db637d3284eb4621904fd4a5fff8d9925637b9241d82ed915caf1842dbfa7eb1f5f90d77fbc513fb256de93c6fc06a9658c4bf685af1b4ee