Analysis
-
max time kernel
94s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 07:37
Behavioral task
behavioral1
Sample
fe11145cafab6b69ceaabf800b915192_JaffaCakes118.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fe11145cafab6b69ceaabf800b915192_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
fe11145cafab6b69ceaabf800b915192_JaffaCakes118.pdf
-
Size
44KB
-
MD5
fe11145cafab6b69ceaabf800b915192
-
SHA1
abcae994345ebe672cc02ab379b39e1f74e87a55
-
SHA256
73e0b6aaeec641bc3949ef5092be55d5b088a675421ab770368511571721a75f
-
SHA512
f9e076e4856bcdbb3ea1265f166202727c06417df8bb61ca9527d0081b8dec4cc59476322a8c773d6b7c727cb506723cf26b977e890358a156e9f5ad436839d4
-
SSDEEP
768:kKjniwIxJd+9D+c6uTdDHCNHo+SCid+EiLjGLc3lsXlOQC8Gh3N0k:kKjniwaJBc6uNHAHACf3SoleOQC7h3N/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1200 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1200 AcroRd32.exe 1200 AcroRd32.exe 1200 AcroRd32.exe 1200 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\fe11145cafab6b69ceaabf800b915192_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f0bccce1a74fd56deb18dba26fc3f597
SHA1323f896c6f21133f6853a57c71e2f1d042996c60
SHA25624abdc79f2ec3bd91ae866ca8c28fbb767c44b90490b26f29af504c0751b781a
SHA512ef2122959e4b7848709cd5d3129cc0b004a771ffcd9d12ebb6f7e7e8dab88e7a50487f4e234ab45a93423b2e119101f1a303e5b83ca09887070d17b60dda5503