Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 06:22
Behavioral task
behavioral1
Sample
2c653b0f68fb5fe3ce17b9d3c22ddfe2_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2c653b0f68fb5fe3ce17b9d3c22ddfe2_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
2c653b0f68fb5fe3ce17b9d3c22ddfe2_JaffaCakes118.pdf
-
Size
73KB
-
MD5
2c653b0f68fb5fe3ce17b9d3c22ddfe2
-
SHA1
c34c38ff99ee17c20ac3a17d86993264d593f340
-
SHA256
603ccc9281ce421e12d28179921c1726783a315039375f53cc9175ee356c14c0
-
SHA512
3c65cd97bb417ff531b3d9556d636f92e42fc3360caba83e85ef3f1ce716a67d4fb2f5ed4fa6b1f368aedb683efa3e972b0d0e895539ad944dfecec45c3d37c5
-
SSDEEP
1536:dgh2UMVqkmwIt2FaW4ZoDiesqtN3Bth/4wlEahyoD:02NV+taaW4ZoNNRtp4wlfL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2868 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2868 AcroRd32.exe 2868 AcroRd32.exe 2868 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2c653b0f68fb5fe3ce17b9d3c22ddfe2_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5992ccac606a2265b6e66dc03e990a7be
SHA1a56afcb1b928c8360c5924fb2289fb255313429f
SHA256d8652f3bf0752b789ff43a5584471214b3e757ce8cfc27f15ab9685df4dbb79d
SHA5124cc64b0908c31018d8f6b1ed811f32a21cb6424cb38533a362472a86c694719c456dcf7fbc40b2c7aaddb26b051cd2e9e9c9bf17690c1f0264f729bf414f5ceb