Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 09:02
Behavioral task
behavioral1
Sample
2e5f78b063cfbeb2ff19d1e70de8010d_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2e5f78b063cfbeb2ff19d1e70de8010d_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
2e5f78b063cfbeb2ff19d1e70de8010d_JaffaCakes118.pdf
-
Size
87KB
-
MD5
2e5f78b063cfbeb2ff19d1e70de8010d
-
SHA1
5af0595fad5aa7dd7e95f95f092e7c87691053bd
-
SHA256
bf8338c3683d740faba2c22d0b39d93bfc73daba6d79290d65581bd14833556a
-
SHA512
642b8f9e2787b7bcdb6325e5959cd6db7f9e4189d18f26bea28db8749c84a362643f4180b8548699667f5f28500f32ce56b73eeaa5997687556bafd1ec1036d3
-
SSDEEP
1536:UR7Cv4ol1HI2UK70zNbLfUFLMNbJIAfydrsp7kFpWieEp3v/juW6pOu2pmWoEZW1:jvkFfsiNeRdrsFSJv3vrru2piEL6So
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2136 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2136 AcroRd32.exe 2136 AcroRd32.exe 2136 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2e5f78b063cfbeb2ff19d1e70de8010d_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52b82bf4d103c3b8ed40c0d9e65fc3c0e
SHA1a0be531a757606ee7672f3ad880282968dba3691
SHA2564232856367ad3c6c2c2af4a8054ddc60b4a16bb001eccc39b5c53ddd9d917909
SHA5128af87266c1211ebb8953587deebf91b33be03d7e2a63dd142eaf64ece44e0d77a2baceb8160af776f5b0334b6cf94265897309bb463481a85cfeecb20fa7986e