Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 18:51
Behavioral task
behavioral1
Sample
06f9ff117b606002f240dd3f98887fa2_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06f9ff117b606002f240dd3f98887fa2_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
06f9ff117b606002f240dd3f98887fa2_JaffaCakes118.pdf
-
Size
85KB
-
MD5
06f9ff117b606002f240dd3f98887fa2
-
SHA1
d39781949b5f6fcafa02321e12331ccf9783389f
-
SHA256
cde5118d0430f91a423abad0601293519402632f43fd9c392b8722b9729fa328
-
SHA512
57f64c53d61a767cc51db7f3dcd4ca083edf9a02a1ee13b0c7ef8eed36090158f515ec2cb94bc3d27e298e872971737d2cb4eacaba73d505c2d4e1e5c3dadb87
-
SSDEEP
1536:xao2c9RsdJLCohTWDckwE9OQGycfItuePm2Cb9nfL+OiBVz6VUxSTbb7F:t2/n2ohTScklE3gt/u2I9nSFz6VUxYF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2132 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2132 AcroRd32.exe 2132 AcroRd32.exe 2132 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\06f9ff117b606002f240dd3f98887fa2_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a042aa69501a940ea4addd40573e57f2
SHA10809b57946a40b239d35e837f80df06c22aec61e
SHA2562b990c45efa1f2f69ffe00b94ec4b12f75d86080c875d649bc18014532123b8b
SHA51241eb9de0d6a5bf8eec796d12c854f801536352fd3818b279c6cf74bde37e81b0002268052c50f9c62ff035c049309e18549342277cc0d9be78efd7f7e5ee7305