Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 13:24
Behavioral task
behavioral1
Sample
0adee320c7d3c4171a55cd281475dfe3_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0adee320c7d3c4171a55cd281475dfe3_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
0adee320c7d3c4171a55cd281475dfe3_JaffaCakes118.pdf
-
Size
79KB
-
MD5
0adee320c7d3c4171a55cd281475dfe3
-
SHA1
7dc3325ed4ab9f5652df9697665bb53da5ae2e84
-
SHA256
f55b69ca1fc693ea691735195e928f6aa559b69f6a472a56e7858581eca64181
-
SHA512
742e73f1fe8cee0f9d01b56a59c09a2103e4f4a0ea0319f5821e6055346d22584df8dd9b55044bb5185cf77cbc3008d729d613fd33fd3b3c0bf2eafe799d75e4
-
SSDEEP
1536:W0IWYlsYhlj0sGhyLpc3Gz2kEXgMwkZPn42SHwbZ1:zIWYlsYhlAsteQ23XwkFfSQL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2524 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2524 AcroRd32.exe 2524 AcroRd32.exe 2524 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0adee320c7d3c4171a55cd281475dfe3_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD592115ada3506a541accb7ab6f3f421be
SHA1bb6d1c895b3aa91e32423835b3afb7128f02b86b
SHA2562b3cdef3e0e23e473e86c708e0cca5b2e14446a056d9b99846d84e27a38ffe7f
SHA5124c2e81bebef74c8d07090c78ae0757e471b84a4d9c035d0d07138f907aa3e6f0a119effbc83e4371d350658ce94e19626663fe724677b01d5c06c83f86176024