Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:23
Behavioral task
behavioral1
Sample
eac0e32fa7dcf4ffe3ab34ba67904be9_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac0e32fa7dcf4ffe3ab34ba67904be9_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
eac0e32fa7dcf4ffe3ab34ba67904be9_JaffaCakes118.pdf
-
Size
45KB
-
MD5
eac0e32fa7dcf4ffe3ab34ba67904be9
-
SHA1
4f3d7023cff47a2e8d003f6819e748bb11852395
-
SHA256
450e85eed1e523023502693c4010aa4b144525c0a097301e8ad6485394193608
-
SHA512
3d8923aba4081b15e2761a2e0fa7146e9611fc41cfe086713177200663deb27be3202458da6a9cae202083536360c1fdbfa9e23866e59828b6572f8803fa079b
-
SSDEEP
768:xgGzpD0ppsQCo7yweEyWUSrtdf93OCkRCoGOQqu+JZTqEnLO2sHfbW9bUJNfAMQ/:CGF2psQCg9hMHaqVJBPfsHfK9YNfvQXP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1968 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1968 AcroRd32.exe 1968 AcroRd32.exe 1968 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\eac0e32fa7dcf4ffe3ab34ba67904be9_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58881677e1eb7fa7f8fa29b06ee48ba78
SHA11458752d797c45505e98ecefbbe95bc8a0c7cb7c
SHA2560016a154623a304ab3ff868c921391d79b30b7e551a2e8757b205042a36dfce3
SHA512641ae8ddb9cd520aa7bd65aeb4c5188115e70df70d74582e0a08d70f774093063fd16117152e380f9d86cb12b685074df8a662592e28bfb44438391fa1460760