Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 01:58
Behavioral task
behavioral1
Sample
28cfe1e7b34736a5604ddeadee2cdde9_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28cfe1e7b34736a5604ddeadee2cdde9_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
28cfe1e7b34736a5604ddeadee2cdde9_JaffaCakes118.pdf
-
Size
77KB
-
MD5
28cfe1e7b34736a5604ddeadee2cdde9
-
SHA1
439af7d3ce041f20f41fcf4b2f5c961cd242e54c
-
SHA256
06841ab8a00a06736965420d2ff18c0551dd25192cb3dac8055ad2d547d5d5c8
-
SHA512
2df134a73e68839aabf8595d6a962ae3fdf56f18dc083920ba2c815f770cf0e04ea2854bd2315c539ac48fe6a2f5c7a251f19750de57363ba48a124bfb8abe6b
-
SSDEEP
1536:aiG21pHXZkJZEz80FLi1I84Y/TuqWOpOZyWs+cNzORWTS:DG0HCJOY0FLiGvsiPZy+cN6wS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2488 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2488 AcroRd32.exe 2488 AcroRd32.exe 2488 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\28cfe1e7b34736a5604ddeadee2cdde9_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bd796174c9220bec8f40f03f8b1c8511
SHA1efdb9434d6d5f45a1d1521cc547bfbe3150b3fab
SHA256bafb29f755242bbc160b57fde6d374651539d25958e96fafc79e5eaa9d157550
SHA51273515bc43e481017e6378204818df442a2e24c53c5c8c5e90703ceffcf013fb85936b1f7701a49544f70989fbf9a393850123531250ea0dd0182aa74da011ba6