Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 06:54
Behavioral task
behavioral1
Sample
0e751ab6d6aa2b9a1da287e93ccb3d59_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0e751ab6d6aa2b9a1da287e93ccb3d59_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
0e751ab6d6aa2b9a1da287e93ccb3d59_JaffaCakes118.pdf
-
Size
88KB
-
MD5
0e751ab6d6aa2b9a1da287e93ccb3d59
-
SHA1
c374e29be6eda6a7f5cfce76b5e8dba1b6c2ef93
-
SHA256
b6aaa9d86f6f6261feac43c302e15208c2ff60018db92c1c7841d71c3f9163d5
-
SHA512
1ecc9406292686bca001052e7e5c404c7d53de45be0f0155f269d02d614efd58e6b2e59f505ce7529ce85a71f00d737d96554e8a571d966a8ed704beb95a12ac
-
SSDEEP
1536:WtrAYOtieCc48mf/3o7MtYS4GfeGr1zGb4ylaikWwwdvJCiYnNGiHW8pO7c4r:mrBRh8y3oCYrGfzxzoNsipdhPY4ia7V
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2384 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2384 AcroRd32.exe 2384 AcroRd32.exe 2384 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0e751ab6d6aa2b9a1da287e93ccb3d59_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52796d51cd26a64fed7718c0e3b56adf0
SHA12d0cf31bdb7937149545166e74ede17bd2aa0dd4
SHA2568fd5bf38247f8159cff2cfbe060856ed040236c3edc73f05b5e12bbbaea7669c
SHA5127e145a1a05b2bd729cad3090a7c06f450cb303dc06ec0b2269d34d0947fe89bd6187f73388d95363f17e103dfa8554a0041be232916b9791479323776186170f