Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 05:19
Behavioral task
behavioral1
Sample
f545c5cf50e84157947291092880bd50_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f545c5cf50e84157947291092880bd50_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
f545c5cf50e84157947291092880bd50_JaffaCakes118.pdf
-
Size
39KB
-
MD5
f545c5cf50e84157947291092880bd50
-
SHA1
576e8ac29cb6ada214cfb5980df890fb456a7473
-
SHA256
060fa9f03886d18623da7bca9b3475540a84814fcef2013025faa82e7670dc5c
-
SHA512
796e6be02884a695d904a74108fd1623f3212c47084a84422d00ae025cc542b1896098da81acd2f209312318078f00d54127ee2ff4b665237ee97e052b6d64ce
-
SSDEEP
768:cXuMZmwgCLWar9/+E5HpxozENUb/1pbOQRYHT8qKh99wtOvR3PY3Dj+PCTUECGsZ:cXFZmGWSdjozENUb/1pbOQRYHT8qKh9L
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2416 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2416 AcroRd32.exe 2416 AcroRd32.exe 2416 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\f545c5cf50e84157947291092880bd50_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5780834b180099973d4f94addcce31e49
SHA1ee87ea9146aac3e6788191e41211a76e711bb459
SHA25676803fb99210b7d9a1af0dea9ada05f2ed5ad89fdfc4d3b3873c869bc42d192c
SHA512a1bceaea95e120c72915b9dff7996a41a848ea0ae95fdcc3374a5e6c7245803a75ba26ba0672ba2844308e0b53a4bb8e7e955d3b5afabd0a105dc729fbd7539f