Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:00
Behavioral task
behavioral1
Sample
ea76c1d2494c28cec416e4bfade76002_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ea76c1d2494c28cec416e4bfade76002_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
ea76c1d2494c28cec416e4bfade76002_JaffaCakes118.pdf
-
Size
75KB
-
MD5
ea76c1d2494c28cec416e4bfade76002
-
SHA1
117447733257259994ff317f4df0bb946019a437
-
SHA256
1189855f7cacf8896baa23ae51c659a2f7f5b1e73b41ed929dc9e8c9f7886a92
-
SHA512
e11117d97b2e00bff169feb72b4edcab618e240703b725d1b4782d40a684d9f9bd0e1a9ae27e6895b7cae952a91bf68ad7c782c1d70a2475684052de5cb73f00
-
SSDEEP
1536:HtTBN4Upts2WukPBFABS4Hsrzaa9TEDWGpOKCW0MytU18xQkpJge4:F0UHZypFCSIsrza2TpKWMIU18x1vi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2948 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2948 AcroRd32.exe 2948 AcroRd32.exe 2948 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ea76c1d2494c28cec416e4bfade76002_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5418220be467bfb12405a73f70685cba0
SHA124b8b5bf317e4a461b332d4667c3ff2b663a9e2a
SHA256f3912c9ed1b75ff953ed749de5d7224b492f1fe1bf34063f120c5a00425bf9ff
SHA5129dcaae7bfda1983da8d15feab6fbaafb40c42603a4ccf60e6b50b665c0b12d4c0a0c95b2c7a0aa0381e06f12e76a732f687ca8e91dec55c25ad6955150ab6df6