Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:49
Behavioral task
behavioral1
Sample
eaca96de4910ae15e51e85489a2f1599_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaca96de4910ae15e51e85489a2f1599_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
eaca96de4910ae15e51e85489a2f1599_JaffaCakes118.pdf
-
Size
48KB
-
MD5
eaca96de4910ae15e51e85489a2f1599
-
SHA1
18f1fd46e1b79a7588da1aeb4f41c1d86afaa9fc
-
SHA256
660a148cf2f5164c265d415e21ccef6a58d645888b84c876615458fa00e43294
-
SHA512
43723e77405ae1e048fa45862de112f00985fe3a6607ed70a1659cbf13bfb6bef90964229d93d42ee7229ffacafa630cef894470df528bbae56f67cf7a5d1051
-
SSDEEP
768:sfc+WCtNYJ/ncfKNWaq69cdOgOiEFEvY0jvAvUGOjfBHED7yz+076:sfteJ+ySBPiEvYlvUfdHEDmzP76
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2076 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2076 AcroRd32.exe 2076 AcroRd32.exe 2076 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\eaca96de4910ae15e51e85489a2f1599_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58ca49991bd7265ee1136e4f46c079772
SHA184b0f2fd3e939ebe5faf190c35b21423eaa88a07
SHA256af1b6d021182ef53076b627a7901d0ce0e1adc1398fb0a4e93f881b64012c7de
SHA512a4ac401a0441a8ced7e812c1680b0dbe079cd430a0ac02182f6a3cf52abdf949e30c8f019744231e50f156a9df057cc416bb3a1ba0011a17e763686eba4ca6a0