Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 21:36
Behavioral task
behavioral1
Sample
14fee07eb6dcea605a061f2ff431f1fd_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
14fee07eb6dcea605a061f2ff431f1fd_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
14fee07eb6dcea605a061f2ff431f1fd_JaffaCakes118.pdf
-
Size
67KB
-
MD5
14fee07eb6dcea605a061f2ff431f1fd
-
SHA1
5028c1e95ab243db5af15fbcbc81ad6d5d6b2544
-
SHA256
5b86417f7c10f8e9b411fbfbba9c06823576ed2ad326995ee2d62b55503cd66f
-
SHA512
103cb30e5d3cc5d12ef07af5a71fd055dffb7740b0e108d81376eaef6b195a3504fa2e881461c942de983624993ef2e1570d22b6888b147df541947c3149d180
-
SSDEEP
1536:x4Cbx4wQM7UhpSOmksAoMbTtEBKadhgJNyUFKD9tq+GA9oYzWa1sVahZWXO:CCbuwbUhpSOLRbJEBKpJNyUFKDeQoYHh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1288 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1288 AcroRd32.exe 1288 AcroRd32.exe 1288 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\14fee07eb6dcea605a061f2ff431f1fd_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1288