Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 19:56
Behavioral task
behavioral1
Sample
f080343c1ba7e38a7c0a042d12610320_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f080343c1ba7e38a7c0a042d12610320_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
f080343c1ba7e38a7c0a042d12610320_JaffaCakes118.pdf
-
Size
76KB
-
MD5
f080343c1ba7e38a7c0a042d12610320
-
SHA1
cd5ab0ba32d9f5569d46e1e3d12562494b353b5b
-
SHA256
96d1f28b36044dad5e7b30995fb2ba5b00f11c479685620c78d5ce3fdf3937ef
-
SHA512
d01b8a1005e5df4164325edd20b79c8b219b6bd196ae1c7964323b4b57ec19051065b2f74646f43548c83c48e29a2ae8f150eef453a2be2440b7c3924babe70c
-
SSDEEP
1536:LTMAj8636IoC/YEKE6zuomJvVErHvWpEmQH3kq47URDlxQqbs3jR:3hrjdYfozJvOrHvWz43a7UR8qgzR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1672 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\f080343c1ba7e38a7c0a042d12610320_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c37f5a1808b993570bb057606f31a541
SHA1b3a453ab2ba972d4e19f537e70453448eabbe38f
SHA25626e419e0adc155863bbaa797de3ad039c01a2243ce6174d8d8a81ebaeee0c6f8
SHA512dd6f4c95b320fb39a9cc2226017a549751a38f15d2c9939afe9f42c73177e6e2f012d7363120279ee71561d9150511a010a41581e7b3f48eed32f10740bdc210