Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 06:12
Behavioral task
behavioral1
Sample
eabcbe34b88af829b00b4faf032eb84d_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eabcbe34b88af829b00b4faf032eb84d_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
eabcbe34b88af829b00b4faf032eb84d_JaffaCakes118.pdf
-
Size
80KB
-
MD5
eabcbe34b88af829b00b4faf032eb84d
-
SHA1
e975630eb83d472fe3d761ac9330a5f88d88ed48
-
SHA256
ec68796684a6fe5e895be97a966e9e6886bc65a1621f8593f042121807a6091c
-
SHA512
a60fa79c11e2f2de65459cbbb1ec13b518be9657a054f87e6aa17a6d54d418b726dad02e41810d2730d6798f8c28478b512cd1ea400c1d64d2ee6f959b902470
-
SSDEEP
1536:rgDRcLeirCTArxcGcTE3peirIB6HhqGLr0aqSgyZaW4K6AU5LHEaWspO2nm++Hf:8t8eirDrxcGcg3pelB6BqyHqSgyZ4AUU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2036 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2036 AcroRd32.exe 2036 AcroRd32.exe 2036 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\eabcbe34b88af829b00b4faf032eb84d_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c0afcfcc82edf264941c76172f21f658
SHA1f7fdde5f9e260a3fd3aed1353e293f470c7f8dd9
SHA2568a3d100e785ae4dec409b28a7c8ff16d6a82a4df33c87dc1ec615779912cf192
SHA512a81394aa604774e120736ad285767900cdac4d671ef8a4c6a38f41d1dc4c7e5d1f79417f644a6eb1350a7c42ae4e58e9e256169750d98e84a24c60dbf8795a86