Analysis
-
max time kernel
96s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 05:41
Behavioral task
behavioral1
Sample
120fce7dae0d395b3c59eec07d86fb50_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
120fce7dae0d395b3c59eec07d86fb50_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
120fce7dae0d395b3c59eec07d86fb50_JaffaCakes118.pdf
-
Size
67KB
-
MD5
120fce7dae0d395b3c59eec07d86fb50
-
SHA1
2da0ab627a83a429ff831312216ecd8d4b49a884
-
SHA256
aeaa749af9c921c52f3eb782a893a9b28fdd36b07518550f2afb5e4e42eeadd6
-
SHA512
83c2002f0e5e6073e2ce29404bedb0e64fc1f7b411937e8ff4c6b5dfc063b561f47a9f54de79bfb1544740c2ea9fbb30540ad9b554ff368016684deae003a7a1
-
SSDEEP
1536:Q8Lv72b+9tOQEe0kH/FqgrQlnfaC8AsdBzoU59m3UD:fLwJdCfEgElnfaCaNoUKA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1656 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1656 AcroRd32.exe 1656 AcroRd32.exe 1656 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\120fce7dae0d395b3c59eec07d86fb50_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD591cdab6b29512afb7df5d593fa8966f0
SHA19c5fd53d6e27499dd43b1d44f1efe1efa4e4c767
SHA2562c0a1901c6d02465ac7b658ac381a252b07fed813f11cabb98fe2a4e4da1b81b
SHA512c700e745b6b0508367f3b78d9209290428cd8b85031f1b58b2719fefdc9e0b8cbe1e681c2d7e02912b7259feeaaf0a90aa123b608e4c622cbc53d3b5bbb18005