Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 16:02
Behavioral task
behavioral1
Sample
1406325c2eb5edbbc154e15943e410a2_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1406325c2eb5edbbc154e15943e410a2_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
1406325c2eb5edbbc154e15943e410a2_JaffaCakes118.pdf
-
Size
96KB
-
MD5
1406325c2eb5edbbc154e15943e410a2
-
SHA1
98de6c5218a95a1ed8c5d69b21619a6a39d858df
-
SHA256
33752bcaa20ef85a9844ef53d06c1b55ba5eb5ed1e473a2621bf84022c6993c3
-
SHA512
f01e00f525d0e03291f2e667261bb77a664b6b40311dfaca8744dc9391b51cf83314a09c77ce958404536c4c1c2ab06e2fd2882ee0fd4c9b7523ee0d59b6278a
-
SSDEEP
3072:yQ8rqNQtnnJBPHzGSGgW6scDcRrxeyFscaAW:yQ88+nnJBaF6oRgD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3012 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3012 AcroRd32.exe 3012 AcroRd32.exe 3012 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1406325c2eb5edbbc154e15943e410a2_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53177f6c816fa7160716fa36a7532552a
SHA1395653fdd075c0ecd0a9a8d05390c03ee4824798
SHA2566cc6a0f5f14c0062091156f7fca2e8daa4b72a2b06bdd70cc6cdf1f960a12a35
SHA5127ed318f24ef0929c9ffbf2ebabf0a0ce98ecccb5d0d4c70cb096d131a4c630b0321306db09799605f96d2ea2a0c5ada472727ee3fe5de8e3421c26ab96b04ce9