Analysis
-
max time kernel
94s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:07
Behavioral task
behavioral1
Sample
eaba9c8b71342d16a8fa740c8466e1cf_JaffaCakes118.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eaba9c8b71342d16a8fa740c8466e1cf_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
eaba9c8b71342d16a8fa740c8466e1cf_JaffaCakes118.pdf
-
Size
76KB
-
MD5
eaba9c8b71342d16a8fa740c8466e1cf
-
SHA1
d6d5bbb24dbe1287fad485b2e8bb29a1eb530d6f
-
SHA256
32874a2e3bc0e144d453db457b381fe4ec01286ccef5f6d33728f0c88b7c099a
-
SHA512
a10f31c51f9b7105020a29e7992add02bba51c0873f34c7b32a5a2ddc5e26d5ed8872bbb644dc15e00138b948dc8117fbfe05f9b14d6c2b99495404bd300d409
-
SSDEEP
1536:i0JpiWZVs2YOIf80ILycRboEgdfz5cWYpO2WfPKte2WsU9Nlz3axaG:d/8ZIOosL1zF2WYeW2NlTal
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1760 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1760 AcroRd32.exe 1760 AcroRd32.exe 1760 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\eaba9c8b71342d16a8fa740c8466e1cf_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55b2764f7fd5dc2ecf0a12cf325b67d1c
SHA1005b234b7e54731249127c300fc1d56c8bc459b5
SHA2568f74b129055bf0bda040898d675069d0be097003853505806b335df33276876e
SHA5123e4c277685438e5ca44ac4bb962bbe5396fb18c5180543ffd9129edc51e5c22fa1ade7510f0ec734cad0663e7e3e511d7efa40d009c60fda09d3c3a7f513ed26