Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:49
Behavioral task
behavioral1
Sample
ea87f0a778b71dfb13c0eed2935437aa_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea87f0a778b71dfb13c0eed2935437aa_JaffaCakes118.pdf
Resource
win10v2004-20240910-en
General
-
Target
ea87f0a778b71dfb13c0eed2935437aa_JaffaCakes118.pdf
-
Size
75KB
-
MD5
ea87f0a778b71dfb13c0eed2935437aa
-
SHA1
b2d29789a25201708f56a951788540bfdc5203db
-
SHA256
3720b78e278d8190c9fc1f2532e98a83f8e844f8bff5d66c1027b64f713adfc8
-
SHA512
2db4575df9682481b3a97f4fe289fc85d794bea54301d35f0dba7f580a7bb599833669be429f1c8551251e8bc256bfee48dcc4aa451163a8277166c612197981
-
SSDEEP
1536:oMfeqbCFz3I6w/WkRUfNy25C8hjk3s9zuQooAJ4iLr8Ad5:peqb6IJ/WkRuyQCeY3s9zxD+RLr8E
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2524 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2524 AcroRd32.exe 2524 AcroRd32.exe 2524 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ea87f0a778b71dfb13c0eed2935437aa_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58f9143393713ac610e3e015cd0c17968
SHA1b59a6fd6e154f3fe3ddb85050359a11122d3beaf
SHA2562f07414fe91bf8467eb009fdc7deae124cb7383780aaeffd7410c0ab91dda5a4
SHA51249fb92a21d7f594b8e82f167e82de882e2e515636496bd18a3c0fbf5e12bd9ad33707ab5273ec2dcb734ee2202148b2ae8803bebaca3e9f4998089098fd7b63b