Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 10:57
Behavioral task
behavioral1
Sample
de3a7910b71ef803ba45d580aac59488_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de3a7910b71ef803ba45d580aac59488_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
de3a7910b71ef803ba45d580aac59488_JaffaCakes118.pdf
-
Size
24KB
-
MD5
de3a7910b71ef803ba45d580aac59488
-
SHA1
ba5060080bf7ea8df4bd9513d5ef42659f017e1e
-
SHA256
30c591d8ddbc10dd1d6d2eeb7611eacbaa6f4f6a6682e527db4ee32fe2d1d059
-
SHA512
663865f6763367c460aa8b9250364dffea2dae2062debdc8bcbc969579edad7ae53a154fd1bc40fea0c0bb18ad3802c2e013bcecd1e6cf2785a99ae6a4a380bb
-
SSDEEP
192:WysNAbl6y9yNYyJ2zXoxdj3Ch+A49NP4X+:WysNi6y9yNYywzXco49NP4X+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1996 AcroRd32.exe 1996 AcroRd32.exe 1996 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\de3a7910b71ef803ba45d580aac59488_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1996