Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 10:10
Behavioral task
behavioral1
Sample
00cb450263b832f341661abac3a8f239_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00cb450263b832f341661abac3a8f239_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
00cb450263b832f341661abac3a8f239_JaffaCakes118.pdf
-
Size
68KB
-
MD5
00cb450263b832f341661abac3a8f239
-
SHA1
c450c59186650f4285d720e44708fefbc730c326
-
SHA256
268fcbf3758da95d4c10b784c498919f5386b20f38f3ea022a6b6de0e15c3799
-
SHA512
e9b4aa494317e4ff4d97b94d0f6d7f3e1f9d66e59b33dcab5052dc76ef6f6ae21b49fdf0e2784c7e13772a33d15305d8c0a1a8c28a0991710259feb65ce7f002
-
SSDEEP
1536:ZHgHO/UpmzTWB8rO2zNf1m8aOxYuLw64ZUe9GfPk:xSvmOMNf8+Yuh4ZUe9C8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1416 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1416 AcroRd32.exe 1416 AcroRd32.exe 1416 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\00cb450263b832f341661abac3a8f239_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51b9eabd14a71b30422680dbb44c3ef8d
SHA1742a9fca1953eb01cc102ad773e859060f605e52
SHA2562c566b40e6e4bee9aff69fc0d6d5e3a8bd2e755685f711163565de4ea9ed7cfc
SHA512cbea4ae7f0fbd3f46c0e423ebc8465d2a73d71dbc5fd44c15d2fafb4b2dce0191d96ae583eae3c365fa28ab1ff6550aead17b5bd93e8e1fbf05efc72b30d3a42