Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 06:57
Behavioral task
behavioral1
Sample
16a0a36093f2070f16f18d70ecfbed61_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
16a0a36093f2070f16f18d70ecfbed61_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
16a0a36093f2070f16f18d70ecfbed61_JaffaCakes118.pdf
-
Size
78KB
-
MD5
16a0a36093f2070f16f18d70ecfbed61
-
SHA1
1ff024fdadf9290df6f850f96475908d23d9cef7
-
SHA256
60c80e973a3ef62c0bd71f26ef08f9740f08400e3252ddfb71100152b6dc3ea9
-
SHA512
afbe3547b387557443704b7e2be8ef5d7aa1a001043968bdd783f875807c494fa0e02c5d0d03049b2740aab2791d763da7628960ad3645d27e139a2c8d5ea372
-
SSDEEP
1536:p4mEhMfdHJqj164Axqt//Hw4NHd6LzGSEB0PT1lau9Xzm:mLhUQj1643pHlldGGVB2T1l59q
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2352 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2352 AcroRd32.exe 2352 AcroRd32.exe 2352 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\16a0a36093f2070f16f18d70ecfbed61_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e9a0d50f6b06f1cae17212835eeb9d76
SHA157d1fc43c3e9ace6c323ce6272308bc73df37598
SHA2562a0a1cd03baa04f39153b7ec3fb734cbd164391b83388950f860b4503df1d2e1
SHA5123044dcf203622ad8f7f273b96f32c27537de2c863ba4a7a661cfe56f7b641666be252bafa91fe52021bc7362a38a1fdb890a1885ddc51a50e4bdba2cf1fcbc8f