Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 23:44
Behavioral task
behavioral1
Sample
ea31791761a8e03259e72d57ec744b97_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea31791761a8e03259e72d57ec744b97_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
ea31791761a8e03259e72d57ec744b97_JaffaCakes118.pdf
-
Size
108KB
-
MD5
ea31791761a8e03259e72d57ec744b97
-
SHA1
91ba5ae6965a6424b6c3b76783d2ca847f482fe4
-
SHA256
4679b9de16fbc468ba988dbd9f6b19f38c36d79360e6a42bc1d2ff4a44d82aa1
-
SHA512
25528b4677f9411a7850388ccc5120c59aa92d5a7118d3659a2290da1ab2588e0c2f53fe0b4cd69ab8cba4b8a2595117bb242b7f18c7a5d7fdc5d9f13d46ef0a
-
SSDEEP
1536:aIGkQdvc7iUsk9B9S7ggu48XcX33m3i9ahAbMZCMTI2rM/jaWPX+GswFocSTWsp2:KVuB9OdiXcXfwhStr0MNuXwZSyReS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 628 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 628 AcroRd32.exe 628 AcroRd32.exe 628 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ea31791761a8e03259e72d57ec744b97_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD598f8ec8f194258b08c3219273d4b3cd6
SHA1e088591414b7bcfdf36fd0412fa58badf3b99fe7
SHA256cac0d1722de730dbce5008da07c748f2165b0b5232cedbab9f46a49cedf5de98
SHA5124c5ce8b7074d8e963fcc21beca8ff099b9b6aa3f4378824ec250862a50ecaa2546b033d32284707aece60b47819ec14e04d213e5c607ecd5b4628804563c910f