Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:05
Behavioral task
behavioral1
Sample
ea78045cdacf14f3c9d4f136de75275c_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea78045cdacf14f3c9d4f136de75275c_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
ea78045cdacf14f3c9d4f136de75275c_JaffaCakes118.pdf
-
Size
45KB
-
MD5
ea78045cdacf14f3c9d4f136de75275c
-
SHA1
aee9a1b5208763c77e235dd3051649699efcc905
-
SHA256
8b6517dede90b338d22fef7f481be0af827660c5463d8a5af9d08b222bcb050c
-
SHA512
b90ba2eab718244536e01f91eef1a9fe466889b47e1137bd696b8ddd57237978a04d31b8652a6a320b9b1e76c9492d82412484a579dc966ea43e54e8c54b7c1a
-
SSDEEP
768:tgGzpDwuV8I5fj89peQV9xY8MPsXTJEW9BTZUe+g+GcdRPPyW7Jq:OGF8GC9xVMcHR2e+g+GcPPD7Jq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2684 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2684 AcroRd32.exe 2684 AcroRd32.exe 2684 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ea78045cdacf14f3c9d4f136de75275c_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5dc4a8668d839d08be348bc6553434cee
SHA138bd46540efa7899ffa3f18322afb0a0d97efbe1
SHA256e575d3e6130e7264c2242082985fecacd04b3fcce4e07648046eeea53d17a2f8
SHA51294dce2019b29b73577cb4af03abf89697eb432ce23c9900b4210fc1ee5980b98aaec133bb5fce24cdb5c1672be9f7ca5e9bf4222bdc180a401189b4dd5892831