Analysis
-
max time kernel
94s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 15:47
Behavioral task
behavioral1
Sample
de73f37fd0d0835fc4fe4742ded51f24_JaffaCakes118.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
de73f37fd0d0835fc4fe4742ded51f24_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
de73f37fd0d0835fc4fe4742ded51f24_JaffaCakes118.pdf
-
Size
42KB
-
MD5
de73f37fd0d0835fc4fe4742ded51f24
-
SHA1
6b692c0a9fea5030eddabb2faff46e579d81840a
-
SHA256
569395752f4526b57d232acec6e609041da1cf6d6a8cbc99f193db11d326b220
-
SHA512
42bbc12d1b148a5f29a833b4243d267396ed609efa6943548bf5c9269cc9ddd967db7f83cc699964b0da0dc07b8fcfd0929d6374cc13731f3859421cc4eac95b
-
SSDEEP
768:/XuMZmwgCLWarYojH2Ec/FoOt5Sf68lI4bED5A5BoBp0aQLEHNNm52V:/XFZmGWSYAH2E8FBt5i68j5BKpOd52V
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 376 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 376 AcroRd32.exe 376 AcroRd32.exe 376 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\de73f37fd0d0835fc4fe4742ded51f24_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5dc33aea1fb112e73a39f2134cca83abd
SHA1fa146eb64ce6433247ee132c962f874b0cab1ffc
SHA2562e0f928822abe65f16e9324b75899e3c6633441dadfdae15fa6a1a8b91b6016f
SHA51206b5457e6f9ddd67966681e865e9a9fe3ce0d187ae088d0ec244cc97c184ae8a3ddb7237290c3b490a693aae81d1fccf112813e855937d1463c2bec72db3e073