Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 19:16
Behavioral task
behavioral1
Sample
0c2101cf24287da29e7fa8cf6510c64c_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c2101cf24287da29e7fa8cf6510c64c_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
0c2101cf24287da29e7fa8cf6510c64c_JaffaCakes118.pdf
-
Size
90KB
-
MD5
0c2101cf24287da29e7fa8cf6510c64c
-
SHA1
622129d2ba0baa106bc405a24d2f2f18f042d82f
-
SHA256
9440c1360ea0a23bff574e5dae22b946faa1db975ca8c37f1d045fcdc417de54
-
SHA512
704f3b02050f5f2624eb55dd0b3f98a150132045ab488ceb01a753727cf44bef1d8f92b2281a6237d87930f63189b832643ad416068adcacf5391fbdf7ebbf9a
-
SSDEEP
1536:RfMxJeQKsQ+3PHErhX/JQuV3XSMt70ejyl8ddeK1Tf0rWapOtQHW6QKD59x5GA:GxJeQK+vEVXlVHSMt7NeKreo0ktQFDR3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1928 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1928 AcroRd32.exe 1928 AcroRd32.exe 1928 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0c2101cf24287da29e7fa8cf6510c64c_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58fa9e08513aa7f84d129668b3984564e
SHA1dadba8027fb1c5dea6a929b87528d15baf7c952b
SHA2569405e585fd4ae4936dc83845daadf036f77ea552d0f0e7dd33f50f7930b9dd94
SHA512ad83a20afb9d7bed0ab738be780edd8bd155b30fd1be557cb6472fc0239bc24c00cd51829b6737a0923b3b782d4d1742727bd5d9bd31cda9a27bd299e88523b6