Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 10:05
Behavioral task
behavioral1
Sample
17a58aa6fcc95bb6ea5b082f9e9b0681_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
17a58aa6fcc95bb6ea5b082f9e9b0681_JaffaCakes118.pdf
Resource
win10v2004-20240802-en
General
-
Target
17a58aa6fcc95bb6ea5b082f9e9b0681_JaffaCakes118.pdf
-
Size
93KB
-
MD5
17a58aa6fcc95bb6ea5b082f9e9b0681
-
SHA1
295ff489759945cd7bbcce4bd5907b27ccb33bc1
-
SHA256
5bd07c1fecbfd39d07ab38db86791878ec84177936e289ecc27e0171950d78ba
-
SHA512
3f70193de5adb49a325cc1510ea70673f258666adb9b29bac1d59af357f3fdabd8b176ef5a55809b59976283ef7446673ce844b05dbda1b936de10146374ba0c
-
SSDEEP
1536:25GQyG5djsxv9xr3fwlwCXK8+fjBp5L/1zGHQ+2x5om/WkNpOPaWQno/WH0r0Dz2:ugnx4Va8wjv5xGwqmgPmo/WG9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1540 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1540 AcroRd32.exe 1540 AcroRd32.exe 1540 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\17a58aa6fcc95bb6ea5b082f9e9b0681_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57c82aac3426358bc9df9b82401f13744
SHA1c1d79ba5e3fc397377d053029fc9bed4030f6e01
SHA256bc21308f2e180487b5d8df47518dca92cf80df9ae0487abef88a9b43af396fd7
SHA51203f8068f82644782f2a2606156922afd9f714d38bd69d823312f0cdd8795f4c9af18252cae663168f077e2eafae564c82087a09b8c2935904e5e0de8e97a0451