Analysis
-
max time kernel
94s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 19:33
Behavioral task
behavioral1
Sample
0c2e26cf18c4bb4ab92350aa87f270eb_JaffaCakes118.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0c2e26cf18c4bb4ab92350aa87f270eb_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
0c2e26cf18c4bb4ab92350aa87f270eb_JaffaCakes118.pdf
-
Size
84KB
-
MD5
0c2e26cf18c4bb4ab92350aa87f270eb
-
SHA1
7b9b17f200df1b915b116d19b72070c5f70a30f9
-
SHA256
616e01c6c704ea6c06e64e4d0bef3ab3ff9c5b1b167fa71464395f57920bf6a2
-
SHA512
60666d23bf7a011664f52e3c7b049097577d9a0f1dba30b9671c477a70657d95a0f8f80b76b64ee9633349433792721259ca741702f5806a52c8f132477c6e64
-
SSDEEP
1536:9Tqk1zwiIgqRoeqjgro1UZgEotSOTmUvNWB9BA6WOpOaZRE9fcQLLhi1mp:Z1HI9qjgrYUZixmvAvaZuHLc+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2296 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2296 AcroRd32.exe 2296 AcroRd32.exe 2296 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0c2e26cf18c4bb4ab92350aa87f270eb_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d8c59f52242bc0db9f7ec7480809140b
SHA1eac6c433f52571d316263a3d5cb7b4dd7f168c5f
SHA2563093c96d56211c8f043a05abef3a4e993b37c4a5b1603c3d6ad6d72ae877198a
SHA512d380cadb3f86bdb3d9d63064577ff10380099d059347a6102974f3d2ea5ec23e44d7e3c6a66b9890629f79d5d6f997d1d46d999a325a3419254316019030c018