Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 11:09
Behavioral task
behavioral1
Sample
eb352df4275c9cb7ee62d6f5c38f9a41_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb352df4275c9cb7ee62d6f5c38f9a41_JaffaCakes118.pdf
Resource
win10v2004-20240910-en
General
-
Target
eb352df4275c9cb7ee62d6f5c38f9a41_JaffaCakes118.pdf
-
Size
50KB
-
MD5
eb352df4275c9cb7ee62d6f5c38f9a41
-
SHA1
ac070fd88fc6037ff639b39d640c873b25cf3a5a
-
SHA256
bd786c00c0af672c7e18ddf8b33e73598983cb5150a424e173d862994bacc4b6
-
SHA512
fcb87eda575b3f85381bd7936bd3cf70a4a1521ef4b31c9a5eefb5edfe6c55e0147dac45ac273c8e9931978a8ab5795fc5eb092c24e9d09bfe61061eba30cb58
-
SSDEEP
1536:tD107qYwPFG2kJSbv1S/jL+ZnnmxbngcjE2HoIh91EMoNIcHabqNB4ATXFZmGWSN:th07qYYRYctwv2nWDBQY1LqM1L+NmAzJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1044 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1044 AcroRd32.exe 1044 AcroRd32.exe 1044 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\eb352df4275c9cb7ee62d6f5c38f9a41_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b31ff54a4e022383a3ed77f58c7a46d9
SHA18a82892fb542439541ee5f447a71aeb4ddd10238
SHA256fc9aa6b47925f54d6789c33d349eddb858407410e93198972ab15efafe588068
SHA5128b55db7ea5c8aff2655e53028bdb3acf76a3f45f06905e65c6b542c2dd411f5ef37a2495443bd7592612fc1486c5fbd6956b3ba4b93ff87a495fe38caec9ce48