Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 09:16
Behavioral task
behavioral1
Sample
008f925358c11d4dfa58a7081875eb93_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
008f925358c11d4dfa58a7081875eb93_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
008f925358c11d4dfa58a7081875eb93_JaffaCakes118.pdf
-
Size
113KB
-
MD5
008f925358c11d4dfa58a7081875eb93
-
SHA1
e5eacc050d573e4f5f133b5b985f5bcfc50bf25a
-
SHA256
663d8f05ee4331d251c1af7bdbf91e3e029d54a1384fcbbf27459441906d5bd7
-
SHA512
1194ae7a64c661913f6e1ea4a7afa2f78e817e76b6bcd30a0331f7b64945aa67105340db3888f07935ca9263e5f1a472b0a70a1e522a9272277cde20d9217c9e
-
SSDEEP
3072:N2W6WyI1T85XLOUAQC0sRaNtrEcZ6INO0N9Alm:wW6WZM3rC0trEe6eh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2688 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2688 AcroRd32.exe 2688 AcroRd32.exe 2688 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\008f925358c11d4dfa58a7081875eb93_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5545dd6237d514c66b52c5953c384162c
SHA15b9507587a89840ebcea4e181806ea2a3d01cbf4
SHA256031961eb98caa315a3396d7eed051344fd541c77decd3a44db32ca54c9585233
SHA5125841686512a3107bda3300554c719223c1221a9e6da605b4ab8cbecc845d5bd1549c29d6e356829bb12a089e2ec80de3e2e3f2d474a32ee001be04448427ed7f