Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 14:33
Behavioral task
behavioral1
Sample
0f2b4014ec5d3a3fb85a02e36cc8e052_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f2b4014ec5d3a3fb85a02e36cc8e052_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
0f2b4014ec5d3a3fb85a02e36cc8e052_JaffaCakes118.pdf
-
Size
84KB
-
MD5
0f2b4014ec5d3a3fb85a02e36cc8e052
-
SHA1
9e47e3474f7b59f8d978a011e648800b361f2738
-
SHA256
a2112de4a245279feadcaef8665f6b9bb5c87badb22b14643fe27f58dacd752a
-
SHA512
f589d1d345e8d1c8ea2a9e6d7949228c2ae74d64c8305d26a7258d83e0bafc15213bf32439f783e8c5b6b61b11d7ead9d44851e341b667c174b9c93bec0fada1
-
SSDEEP
1536:9cjLCZ7FRIBo1/IhpxcOm8i6EdCPY7WqNExzaTDPNhWQpOCwngN:CjWHRIi1wr/XsdVNYoNYCH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2684 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2684 AcroRd32.exe 2684 AcroRd32.exe 2684 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0f2b4014ec5d3a3fb85a02e36cc8e052_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e45aa7a8d06e4ce4cc3598f63b0155b6
SHA1672259b497cebc570f754c95588d39c62181d189
SHA25648d03a75d6167a790aa3b788cbd2fa71718d22a395f8af39d09a5819374bf624
SHA512bfece837abfd8637cef196568edba064a3b238f8271faa334da81e47bef285a7d789d9e448385cb9471511d9669745cef7251386b90a513f7939244771303327