Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:37
Behavioral task
behavioral1
Sample
084849482cb1a17a7c32b8a06ab618fb_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
084849482cb1a17a7c32b8a06ab618fb_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
084849482cb1a17a7c32b8a06ab618fb_JaffaCakes118.pdf
-
Size
84KB
-
MD5
084849482cb1a17a7c32b8a06ab618fb
-
SHA1
71ea98f019805d637dbc0b0d15695d4706134635
-
SHA256
58daf0414ae9aee39bb629552f16e9177a385ba9636e122f2d142c2edd9df031
-
SHA512
88596213c172ee81e93ad29a7b06aaf4bde09b83bca7683503a9c25c8e0b86bd80c50e0b90bc0d5beaab1937b461a781d783aa918b56fd6541376ecdb3ed72a1
-
SSDEEP
1536:Kx8ygIYdNMONPxZumXqH5g37eqY9KqDXLzEdTcA6JWVihWapOtQitc:OBgIk2AxZnaH5GiqmKqDXkl4uiutQ1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2720 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2720 AcroRd32.exe 2720 AcroRd32.exe 2720 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\084849482cb1a17a7c32b8a06ab618fb_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58a9b48f6264b55aaca7ac2cd2e31f2e1
SHA10cedba88720ed6a18e1d6c81147e078f21b65b45
SHA2563682254fcb2389c93d6b5d8580b866f3fed40d95457d8dd18f4beba1d921b8ee
SHA5126416618ee57cda52c645f0c145fbfeab840d80d6e4ec5135e06b0fa976a939e2590202863a5e7210948ca05a8efeac1968a44e2eef33019b10bc7e5d29a3548f