Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 19:15
Behavioral task
behavioral1
Sample
e0db70750a65c313122ce1384c5809f8_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e0db70750a65c313122ce1384c5809f8_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
e0db70750a65c313122ce1384c5809f8_JaffaCakes118.pdf
-
Size
61KB
-
MD5
e0db70750a65c313122ce1384c5809f8
-
SHA1
010b78698144aeb575d347c431a2d2413d2146e1
-
SHA256
e913aa53d15314c2b2737e1d259a9379d6fcc371c7bf64fbc5532032353871d7
-
SHA512
2690cbf4ffbc5a9c68ca301dec402f178649d458b371a4422ab35df6df966fac98dcb08e5fee357526108f38f76458acf7319e94913a38ee4732b1c50a7a598b
-
SSDEEP
1536:TGFlpQ8ZulqnPvoRf+RyQ8lviCMN+kuIkx/MLKGViv/:iFlpEqVQJmbkx/23O
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 388 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 388 AcroRd32.exe 388 AcroRd32.exe 388 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\e0db70750a65c313122ce1384c5809f8_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56dc5bee4467ee4f985271da11863e602
SHA1146c61216deb7f53c92488c7aeccbcbf6a86fcc6
SHA256754e966b10da2524bbec2398245a5cff911751df839890c547b3c1a778a3afa5
SHA5121ea98090e373744d2d4655e3e8aa596b3c8545be69b6cf6a3e6c48fe9321cbf150f0f0041dc41d0619b65328f5c7a6c9fa01225102dba7d2f93409399cdeacbe