Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 09:09
Behavioral task
behavioral1
Sample
eb022b1e64cf13658077d16dc597b5ad_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eb022b1e64cf13658077d16dc597b5ad_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
eb022b1e64cf13658077d16dc597b5ad_JaffaCakes118.pdf
-
Size
55KB
-
MD5
eb022b1e64cf13658077d16dc597b5ad
-
SHA1
ea5840afd13ea43fb5aba1a898d8bb16054ddde6
-
SHA256
859ceb16610a9051fe9133fd2ce63a2727af0b0bef09fc97c570b3c7ab291c4a
-
SHA512
4e92413d7bfbdefe9574de3243d7c815ea9d7738ed4a2008578e1aaabfd2f27d9256078a479d4f00c3776fe9bbe3279722df7dbfbcfcce2e3a6995f55faebb14
-
SSDEEP
1536:bGFnKLTEq0WL9EhteKzVVf5amV/nVJ9rIe:6FnKLgUL9E9515t/f9V
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1652 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1652 AcroRd32.exe 1652 AcroRd32.exe 1652 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\eb022b1e64cf13658077d16dc597b5ad_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD598d43523f2199783205546324963d575
SHA1280a79b2e148032b26f0cb31ff8c5f050a1d366b
SHA25613ec31688d21bed1fab5ba21071eff7a6f7950632f9b8e5f80e4f1ed2d94ff05
SHA512056bd34a29eb19fd500c442074e3dec20e400a07c487ba82458a1c08cf8fbe9efcc481f1be7e9adbf1cf47e879e35af346f7dc4696217509015720160234e5f6