Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 10:01
Behavioral task
behavioral1
Sample
de2ca592a168394684c071ff00ef5b2f_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de2ca592a168394684c071ff00ef5b2f_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
de2ca592a168394684c071ff00ef5b2f_JaffaCakes118.pdf
-
Size
12KB
-
MD5
de2ca592a168394684c071ff00ef5b2f
-
SHA1
1cec30b8a20235ebaef2f1df3d344fda7d53adae
-
SHA256
1abdc04a62609ca056c12821119e494a1516abe9879e3d7637fc6feb16056fb5
-
SHA512
0dacd6d7a05392eb227d217f6e1860b1b55693431fe7f914aa659ca9074142dffae72aae02f77d00f52dab9a5511ec95980ae1bb9ae982594e7870e1a9c580fa
-
SSDEEP
384:bONbedw+lJ54afotl1Z30gqN95l557hLNgcxlmmmmmmmmmmmmmmmmmmmmmm/mQIa:Fml1p01Ll557NNgcxpJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2672 AcroRd32.exe 2672 AcroRd32.exe 2672 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\de2ca592a168394684c071ff00ef5b2f_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2672