Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 00:04
Behavioral task
behavioral1
Sample
07fa08917203cb598fa4936b2aa7c2d7_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07fa08917203cb598fa4936b2aa7c2d7_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
07fa08917203cb598fa4936b2aa7c2d7_JaffaCakes118.pdf
-
Size
47KB
-
MD5
07fa08917203cb598fa4936b2aa7c2d7
-
SHA1
8acd43af10e129de9710bb521f21be74e659c572
-
SHA256
f5b7aa0e6596b90a0c4df68fe001cde7924b7861bb871726d487004a3a2e27c5
-
SHA512
eb22a4fd4f6aaf40ae64a84c756964b1545cb4caddd35988dab366bc607ceaa138b1a38764287392acc4b79991cbca2627ab460c2a0e2e556b54a637c498c851
-
SSDEEP
768:28M7LaS7916e9mHSokK6iZlHnTt6KdLd4twyJA74qWdLcrJl3ivlZlPEtR4w7:GPJ9N9zwZxR6K34txJA74qWZcrJl3a7o
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2400 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2400 AcroRd32.exe 2400 AcroRd32.exe 2400 AcroRd32.exe 2400 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\07fa08917203cb598fa4936b2aa7c2d7_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5147a9f05a0dc584561f1e6412929f858
SHA1a5ca2f0a5089e3cfd50c97c63e03a3a5b38e0db1
SHA256fc679537d7e39b87bcc11245c0d10548c2861a517c8d44950e13988efa78fe21
SHA51288a5040164bfc5dd038eb8db816cf52f8297fc3a816b538dd03eaf7d18fb57e8dd613e1a7287f8283d25c1ec7ef5e611b3769823c89af26d711dd618cd82004c