Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 08:32
Behavioral task
behavioral1
Sample
2df7450dee14ae4c30044ce225726a47_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2df7450dee14ae4c30044ce225726a47_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
2df7450dee14ae4c30044ce225726a47_JaffaCakes118.pdf
-
Size
44KB
-
MD5
2df7450dee14ae4c30044ce225726a47
-
SHA1
f53ade134045174e30be3f0fa423eca0f6188351
-
SHA256
9b21cae90d68d41ec5aa074f9e475d007b39fa912eda49ea058f0b46781775d1
-
SHA512
367f4d78b6c2ef2158d48a52bfb4278e16373979ae7d0ae36d341926530eb95eac5f64e225a732ac3ad0720043fabf6d82d4b688f236776706eacd9bd4849cc0
-
SSDEEP
768:BGcpcqYLYfzVoU6cWleViocDrEtiWcJUNvMAp/f8yaHEoXK9/wVS:B5pPYLYhVWoVioQrAiWcJIMAp/f1ANXQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2692 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2692 AcroRd32.exe 2692 AcroRd32.exe 2692 AcroRd32.exe 2692 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2df7450dee14ae4c30044ce225726a47_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d0df5c3da65d25fb079c556b5df2b5ab
SHA11d027fecaeeeaaa28f32cc15a888a1f94e638a8a
SHA2569963af5976943d7801b2209f26b5ac17d9d4f5315a8046da0e47a10c169af0bb
SHA512295f82c9290e82d76717710659d5c557f3f52011d5b6547e96cba5e03916c4ea1dc3654acfd09defe31cab3007fb9e391712b0d614645f311f0bd4dd9130a1e4