Analysis
-
max time kernel
92s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 02:10
Behavioral task
behavioral1
Sample
28f3ce4b09dc04114f8c47b7df95aefc_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28f3ce4b09dc04114f8c47b7df95aefc_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
28f3ce4b09dc04114f8c47b7df95aefc_JaffaCakes118.pdf
-
Size
64KB
-
MD5
28f3ce4b09dc04114f8c47b7df95aefc
-
SHA1
ffc924b01253070b5b19bde68a83628c9ded3197
-
SHA256
2d0baaa9ae568d6383c19c1264c900e0044c77943854f34777d60d226dcc861e
-
SHA512
7a9739470812a66e7257b3e8357d0ded3dab4c285014ce10853ab35904d4b837bbccb039230b316c0882c6cc5d272e520941e64be9a8a578b907f1f0d5fd4e84
-
SSDEEP
1536:SqvJ7S1xNFhimKAh8BXMSPm7E3IpcCw/pMjTZmFFfG92Ci8zUWwpj:1v01xNXlSOSQpcCwhMjTEGER8I
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2088 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2088 AcroRd32.exe 2088 AcroRd32.exe 2088 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\28f3ce4b09dc04114f8c47b7df95aefc_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58f82f3e9d3319885b467bdc41795475b
SHA137bddb08be726fef924b71b03db98373a02ff921
SHA256087c363c0044e920dfefbb21328a0625cd2ae15761d222c4b2fa34bd8ef09778
SHA512099b1b835a9276a9de154859ebc34640deec08ce5a1704c9e7aa53ea00ac4ee0067d33495609153f907e53d614b08a7ea9778e697740d9c58299d59001835422