Analysis
-
max time kernel
94s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 03:18
Behavioral task
behavioral1
Sample
15f4ab12418c6abfaedbe889a2e69865_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
15f4ab12418c6abfaedbe889a2e69865_JaffaCakes118.pdf
Resource
win10v2004-20240910-en
General
-
Target
15f4ab12418c6abfaedbe889a2e69865_JaffaCakes118.pdf
-
Size
75KB
-
MD5
15f4ab12418c6abfaedbe889a2e69865
-
SHA1
2ec525103b3c2ae10caa1048ecde750334a6f864
-
SHA256
d156579699c78d21db842e8df9f7c6b2111797ad5ec956e91e1eb69ad23250b9
-
SHA512
3ddff0fa71955a48ed5d20de2a9a7153bcf07860ef3a8afa0e425767137e662214ae9868bf85af9dbd70a2b2e7fa7ce7c9af74bfcfed39e763564e580bbecaef
-
SSDEEP
1536:zmIDOzB0lrjuef3kieT9u9twLkR32vTcoRW3Dv9tIIEpuWWpOxES0B3ci0WnBnYP:BDFuefDc9dkRIAeI2xciiZD0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 964 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 964 AcroRd32.exe 964 AcroRd32.exe 964 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\15f4ab12418c6abfaedbe889a2e69865_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e517b880bdfcad61ac6195193425d6a4
SHA11b6586d38034f1e04fbbff1ad802147ede58a81d
SHA256960dda300e8b635d128f98217ab8719fd6d4771c00b37bed4660f75114977edb
SHA5123ccd3b69d7d3f50529e96fce691e57a07e09c4e9f7bbc4ea4f83b569ab9fc8eed4b6a4546259f4c1820b19f9891c945430153a0ab5b22219c720b3aaa7cc9e14