Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-10-2024 23:34
Behavioral task
behavioral1
Sample
271d27a718d898cf25d6dc319951e61a_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
271d27a718d898cf25d6dc319951e61a_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
271d27a718d898cf25d6dc319951e61a_JaffaCakes118.pdf
-
Size
87KB
-
MD5
271d27a718d898cf25d6dc319951e61a
-
SHA1
f96c21633743b7c79b81aed666d7174fb086e582
-
SHA256
7418f969dc502a63158473729e22a2ff21d52866b8bae7ca45c849d40d965678
-
SHA512
a759c782acb769e48442f4ead71bb63eb579aaec16ff6f6cdcba767d44fef8701fbe24606fb310751111537c3376b2bbc4aa96065a7273a8b8fb411bb8cf34a1
-
SSDEEP
1536:zD1KasXhSNeLpboQ5bQf40xVgiWe7O0LGwW4TqMr3cYcWhXHUUEce/boxNLWQpOt:/1KasXhiQF30DWYjKdy3vXHUcQoxN2CK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2824 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2824 AcroRd32.exe 2824 AcroRd32.exe 2824 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\271d27a718d898cf25d6dc319951e61a_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD561ea0d3a6a8070495d0b77af0284ae4b
SHA189631a9393d4ca155da398bc22f6e6c769192905
SHA256a9847de74bae8ee4b00d18988edbee7fb48a08aeb1c2454ebaf1310be4717881
SHA5124c358d9829353a4f679b3eefafa9a639c1eb9731a276f22732e08e20824abbeedddc6cab7372a6ce98ae8453f2c589a81da727a69f87b124480a3baff2e4fe97