Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 02:08
Behavioral task
behavioral1
Sample
e17f8a0d1171e75b77d45c7072727ca1_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e17f8a0d1171e75b77d45c7072727ca1_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
e17f8a0d1171e75b77d45c7072727ca1_JaffaCakes118.pdf
-
Size
345KB
-
MD5
e17f8a0d1171e75b77d45c7072727ca1
-
SHA1
2fefec4129ba0dff3d1f4b77da3b2c08b4f8723b
-
SHA256
58605014a3975883a27019de8f2c8938de6dd42aa32662451316578c00f65f2f
-
SHA512
fd288427c333ec41d0465f4786d45df9198445d8fb1eb9ec2d310a0ce19b73e236c44bc6e0535f52ca79b6817376339e0595d6141b16f38d83bb2e3531073663
-
SSDEEP
6144:qnVtc8651tmVWYbRhjNpGV4Et1lkVGpadIsPJ56PbVzd3ookGByYeAaH81qGhz:qm51t3YHZ8VDalIsPJ56bVz5oPC+Hc1H
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2196 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2196 AcroRd32.exe 2196 AcroRd32.exe 2196 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\e17f8a0d1171e75b77d45c7072727ca1_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c036eddbe7b03fb35588e9a66e1c9f9c
SHA126b2594230feff21b12def57fd98cd3c11133848
SHA2569caf9d515d0c4b55f4706f524188c1070a6e5271a418a084cc23239a41f180ff
SHA51226e82e0f33c5f1f16731df408de033db65695a5f4bfdeb627170f609d9aa1f7c7f9a265940faf7123a48b207c64725b8b4adea9a6a637551df37de08d41924d1