Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 20:09
Behavioral task
behavioral1
Sample
0c4b0af99ea827ccfb551a994a53dc5a_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0c4b0af99ea827ccfb551a994a53dc5a_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
0c4b0af99ea827ccfb551a994a53dc5a_JaffaCakes118.pdf
-
Size
74KB
-
MD5
0c4b0af99ea827ccfb551a994a53dc5a
-
SHA1
cb455a8b7c21b07644a541febc7927f6dc9b49aa
-
SHA256
fc32b3a4087e2ab4da6abf08118086c14e627c1031be72f952577169af3fc019
-
SHA512
d1a315fda4c3b7d00469de693196529ef8da4f649e01247a98260e513ac3a641351b991e04e2ac48f7babd7244484734817ea1e7c96fdcc6bf9fe9d9043b9e48
-
SSDEEP
1536:7EOxyHqMA0d06TxONwfCcmoYhB1chWQW8pO73WhyNriwtMeiG6kWfSG:AOxLMR/T4wRMhzchW77Pt2ebRWf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2228 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2228 AcroRd32.exe 2228 AcroRd32.exe 2228 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0c4b0af99ea827ccfb551a994a53dc5a_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51c814cd9cddd23f3ff3dcf6ee99f6df3
SHA1643312da670cf0f68d89489a59d4f2f95b5d98a7
SHA2560382722d3713fe895f9bbc5c4213c4c50c5ba75b3a90f3474b74ac617eb52453
SHA512670f94a31abfe628a29311b022096cac2f42d49427a175c37a8a89966222c0ce3feae684d4ece8d4ba60ff1ae9c6e6505ee72e0ada4557bda32c6b3ad3a102de