Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 17:19
Behavioral task
behavioral1
Sample
0272812b9435bdbfc17f5d19183129fa_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0272812b9435bdbfc17f5d19183129fa_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
0272812b9435bdbfc17f5d19183129fa_JaffaCakes118.pdf
-
Size
101KB
-
MD5
0272812b9435bdbfc17f5d19183129fa
-
SHA1
18c0b6155c9aa8d329ce73f4e19ed731b4581362
-
SHA256
5cd8739937a8f0f9a5c3afaa8f443108669084cd09bd604131a5f34edc1e2b52
-
SHA512
6e14380935fa68ffe849e1b8b5c5b63b1435d422c384dbfaa312c9f7821a7d6df312427f7cf252a2a37a9ca48d652294329d7140c84901271392974b41876faa
-
SSDEEP
3072:AQo6BxWuKUPAGSUGHZ+DRG2bGzF6uYs2JkCkULbL4:Av6BxTKGxU2vGzatJcULo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2660 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2660 AcroRd32.exe 2660 AcroRd32.exe 2660 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0272812b9435bdbfc17f5d19183129fa_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5db1fd9cfcc1321258060d70143c3aad8
SHA13644b6826f88d505e27dfdbe2bb15ace93630963
SHA25697097190a9e4f8102ed0eb29479e8133d43091e5721d42cba62aca66f23b715c
SHA5124740ed88031c8635435c652556b48ee39e5958ebb67b18f29363de088a80d6fe766d86e4841344135612bf90f74396b7b4146ce5e6f193008da53e608dc26162