Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 20:17
Behavioral task
behavioral1
Sample
10600ab7b6c74e427295ad06c56b477e_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10600ab7b6c74e427295ad06c56b477e_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
10600ab7b6c74e427295ad06c56b477e_JaffaCakes118.pdf
-
Size
87KB
-
MD5
10600ab7b6c74e427295ad06c56b477e
-
SHA1
a11a9a7c9b12e8d15198f041e3601893ff0da824
-
SHA256
8170561f1fec262980aeaba324e8d31d84d2ab2987e59c954d3577ee678e1e1b
-
SHA512
dfb8fb5928ca56009c9211f55028ac51fbeba9637aac1c6912d49a953f906c39f0c9c0b81aa07f673cee8fa2e7a33f0a8843bfb6fe5f169f67f553a8f7791574
-
SSDEEP
1536:jLvD6cP8f4DZwNEwrNuadMqEcL8jQWnhx/F8VRll7W8pO+gW+30A39zf8h:31FD+NnMqbAb/ARTC+W30Az+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2336 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2336 AcroRd32.exe 2336 AcroRd32.exe 2336 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\10600ab7b6c74e427295ad06c56b477e_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50b318745231ea3a851adc82bc352a3d0
SHA154d3c4dda2edc3a4a689a118caa083b01bf3d133
SHA256c32c99661104eb0dc95b64d792492cbe952dc2dc8182345175984ebf8e7aed33
SHA5126d0934a9138c40b2371ccdcea253c558f04044f71574f1e555cc7bafe4f1d2b590a455a462d15d6623825fc2f8e383f0c553cf6000347d9631f29fa504ba8b10