Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 22:15
Behavioral task
behavioral1
Sample
e124bd8d3f1f988b537fba1920409574_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e124bd8d3f1f988b537fba1920409574_JaffaCakes118.pdf
Resource
win10v2004-20240910-en
General
-
Target
e124bd8d3f1f988b537fba1920409574_JaffaCakes118.pdf
-
Size
92KB
-
MD5
e124bd8d3f1f988b537fba1920409574
-
SHA1
93533ce9f9f8ac2fd168ec234c0bb9dcd98245cc
-
SHA256
9f4db88ff63a7922a34284a581ac894030a584507519a116e91657535ffebd82
-
SHA512
9a528882b93c3442a726b79d8baf3ae67ddc23eb3495c2bbc6521679ab6a90a32e98c7bf873528d2aeb69f499568e0bec6cd6126ff024cda089141892d780808
-
SSDEEP
1536:fDh3GXuBdVFlI5t/pbX8yRGvrwZPpzOkQ1pINfbRx9zGvZmFlAWWRZCOgzd6/keO:N3GXubI/pbcjwSRDIN79zyZmFl1d0/kB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2520 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2520 AcroRd32.exe 2520 AcroRd32.exe 2520 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\e124bd8d3f1f988b537fba1920409574_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5dccff90ef2094d5ba1e72f0117d68fcc
SHA1174a6c13cd653ca8a6c0c9b9cf75c1ca24f93439
SHA256e9d3b9541ee235398252b546f56410f6356891f683fcfb1633ec61ce71c941ba
SHA512109b779f2a40338ff2bb794d97a04d6d6ee0aa67c82ab5d3a2a9f5e95e1fd6933fdbd7e5056731ea227ab692226d25640e28ca9acced1913f4f169986b3f8857