Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 17:08
Behavioral task
behavioral1
Sample
fefcd3bdcea343d3dba70ab4a3d4e8cd_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fefcd3bdcea343d3dba70ab4a3d4e8cd_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
fefcd3bdcea343d3dba70ab4a3d4e8cd_JaffaCakes118.pdf
-
Size
370KB
-
MD5
fefcd3bdcea343d3dba70ab4a3d4e8cd
-
SHA1
e9dea6553e8509e34118ffcaaa77a1a1501d0980
-
SHA256
a44b4be7bcbd7d8a04d09092ea91ef9bf242d83945b9e3a8216fee33501ed1ab
-
SHA512
fcb68342e71889a01cbbecc36cc96d2386163bc7353337138300b79ec03dda836559c8f1423a01bbd28f1bf0844405e5569c32ef38e264da0aa4c905501822e1
-
SSDEEP
6144:GPRJm8d9bLv9WD/PEqPtYQI48J7724PBgldgPYefzd7y1+fDSpH7bPBkUx:GrdpU/PPtYQI48JX24cdFebDS0Ux
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2196 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2196 AcroRd32.exe 2196 AcroRd32.exe 2196 AcroRd32.exe 2196 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\fefcd3bdcea343d3dba70ab4a3d4e8cd_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ea05e0b87f800b000a43bea395b173d0
SHA102b616e81ce557084ffaaf288b52cf9d654ec2f3
SHA256ed8e48c818814d8ab51e109b298a39029141b1ed73656f25d0db44c918fa66f7
SHA5127f51f022a68fb5a54ef6185ba054ceb083fa26c34f3620f352796e61378b4b2a551296b56d4d4032f829f0781f3a0b56efd9483943a0e8f00ad3ce29b4956804