Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 06:07
Behavioral task
behavioral1
Sample
e1da9856047704ecaa7e1bb6701135ac_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1da9856047704ecaa7e1bb6701135ac_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
e1da9856047704ecaa7e1bb6701135ac_JaffaCakes118.pdf
-
Size
68KB
-
MD5
e1da9856047704ecaa7e1bb6701135ac
-
SHA1
66ac646e0a8420d3450e5c91e5d629ecf9308619
-
SHA256
72fbdcc34a99e2769223a2817df8c23835167bd97924fab8b91b3c9ff7184d0c
-
SHA512
9b12a777d48c245355b107cd99804a076c3afbdc8811c3fb5dda0e49b5d4e879db148ea4a56ae195f33ce28abc4fd83ff653347181506703cdc513d32f827cb6
-
SSDEEP
1536:/UBIeMq26b2TvV4SQ841IYGK/fGKatnlL4kVGrWmT1FLxLHsx:8aFqzb2TviSil/+vL4WmXLxAx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1352 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1352 AcroRd32.exe 1352 AcroRd32.exe 1352 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\e1da9856047704ecaa7e1bb6701135ac_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD580af6e1e27276d7575965588bcfe1b32
SHA109e341fb796b829d118a1b066564b65801399f0b
SHA2569a484ae08655cc901d347e7951071e51d60724e46732e2097cdc900bb151bf49
SHA5127df4e63987af9326e54b578fb19b891c4abdde1271e0381c4a88303ad69fc67db0ac6001233c6ef336b9ad63f37926383a62ff947bf8b0bfe3fefb9aa9e1bf84