Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 06:34
Behavioral task
behavioral1
Sample
0e62d2898558104664e23737eb768e96_JaffaCakes118.pdf
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0e62d2898558104664e23737eb768e96_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
0e62d2898558104664e23737eb768e96_JaffaCakes118.pdf
-
Size
83KB
-
MD5
0e62d2898558104664e23737eb768e96
-
SHA1
d3b3130441b4d0694db23c024ce95980766a47a7
-
SHA256
48179fd7a0f61f00f7cbaf4bf4c4d3a64e4a058aaf68e855516630078c03838e
-
SHA512
50e82c048d66261c26a6243bb52dd58aebfa64ace2b2a74f3cec8d69709001fc8f8f8c1236106c0b5c9548c243260bade832d7aae3d067cc20e74f16e970e62c
-
SSDEEP
1536:kYlvgGftBUE76ra9oGCTIyGV+UuF1eW8Q2KKlb36jP/BMW8pO7hQmS:BxgGf0E76++IyG1+UT6jnBf7G
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3032 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3032 AcroRd32.exe 3032 AcroRd32.exe 3032 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0e62d2898558104664e23737eb768e96_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56a1476ce4e9f1c854fdb9d1b0a3c3949
SHA17f4d1bb6b8538f4db4af84268a9f660c335425b8
SHA256a66c9dc96f9bd94f1c90b72b85543d88a20740d6c31596818a658f5f44d67fed
SHA512451e3fff5141942a39f17760bdda112cfcf54ffe9aa235365ece0dc663ce47423af5dfbf281eb753a9d534e13b2b4f8fc6a27040c815b5c5f92b8be99e33d022