Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 19:29
Behavioral task
behavioral1
Sample
0c2ac1e22b21e65eebee32655cdae443_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0c2ac1e22b21e65eebee32655cdae443_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
0c2ac1e22b21e65eebee32655cdae443_JaffaCakes118.pdf
-
Size
60KB
-
MD5
0c2ac1e22b21e65eebee32655cdae443
-
SHA1
18988639eab74470a00f721bb138dd9d42ffbd84
-
SHA256
1dfaae49a4eaa47b971f4542d35c66ce381a95664a452c5d17861f9a63d92a93
-
SHA512
8482a3ebba504b784115886c0e365ff4c6b4d70800840b1344ed4ef4569ec0162c33ad3e64b5086e551f1b7931fddb8b36f1489a261bc581ac192f5c21af415a
-
SSDEEP
768:b3y/59DHesY+9wRsxv4CXojaS4qPjiZn5GJpw+1zv4VmB+lSRH54JsQHV6l/V:b3yhcsY+swv4KUvu95GJy6tZ4JdIl/V
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2412 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2412 AcroRd32.exe 2412 AcroRd32.exe 2412 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0c2ac1e22b21e65eebee32655cdae443_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5909d00475f6841af3c832ebdcdf4af56
SHA1471cbce53d752cea1bd86ff1667b00adfe9e63f2
SHA256edd3cf137fcad3d04722da48c7bed44b50a72fb92289ff7b2572cce05dc68a8f
SHA51230d884834da45fbc7f9860cc1c3fbdbd34c2a04221b1aba51fc4e8d3060087acbd200006009fc6827b8513a2cb54857a3b7df76edd6631f0fb9908cd67d37706