Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 12:55
Behavioral task
behavioral1
Sample
137081a7bb4a0b31578bae70891bc932_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
137081a7bb4a0b31578bae70891bc932_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
137081a7bb4a0b31578bae70891bc932_JaffaCakes118.pdf
-
Size
82KB
-
MD5
137081a7bb4a0b31578bae70891bc932
-
SHA1
49fad8e75ad18fc4d197c49f55423e1474ef152f
-
SHA256
680624f5f6dbcb045b9315e4041538cd561674f331b5883dd6d349278e707e4e
-
SHA512
65a87bce326a59d129a483e21b9d8b752506df7396d33d40ff9dba253c848439565f9d22ad2a41eee24e9528d13cddf522dbb6598b8a83c1fade8c085e580e0f
-
SSDEEP
1536:/H2ljPfVvfDGd/G7b+8PNntVMqIWA/MfS1zQwYIGeSVW/pTzcVnjarRoqakoUWXm:ONnKdu7C8PNntWLX/MfQGeSCpT4jaNJD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2400 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2400 AcroRd32.exe 2400 AcroRd32.exe 2400 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\137081a7bb4a0b31578bae70891bc932_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53dbf65d47afbca13d4c1379b49966911
SHA1b2b6eb75b205111fdf363db45adeb999cb67cee1
SHA2561f1bdfee48fa5e71fb784e028891b640b0e7ff4a9f3ef41b86859a1c7e167d2b
SHA5120acce61058de3c218f7c1ab0c3ec3016cc1cf6fc11cc6a515bcef68166ea64c12e6cd842530c2e67dd664931e71feb992dd85a4af409e1946c3453f8c262a39f