Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 10:13
Behavioral task
behavioral1
Sample
2f469eb11ef31c148271c3a35f9b951c_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f469eb11ef31c148271c3a35f9b951c_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
2f469eb11ef31c148271c3a35f9b951c_JaffaCakes118.pdf
-
Size
86KB
-
MD5
2f469eb11ef31c148271c3a35f9b951c
-
SHA1
50499a7723d95ea1c72f65db53498d020a0a0000
-
SHA256
20f5f26c0ab950ce819b0dcf66695bc409cbeaffcd07633a022f2a54c1d57fb0
-
SHA512
2e1df70a9aefd3cafa1f81cc50cb13fe8b5d2afbf8f43623a8eaea6315ee838ff56f0e1ce4aaf4f04ed10fd08fb309285277b906a81ec42a1a53507057a5a64b
-
SSDEEP
1536:F6HGf9S9sD08nCdn2tD771/+vySkeCZuPFE9Xwfu2n4Wg0aNJpMCVFILka3LWQpg:NhZCYJ7cvySkeCstE9gfu2AdNJpnVM3o
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2528 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2f469eb11ef31c148271c3a35f9b951c_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c5d30650bbb2966d01b22da7a94fcbc5
SHA15ac7c20e9db00c256c1e296af6f927ebbf21f216
SHA256835f6249522b27ad103e9f3a335e3d81258993a1f83418ea4a837ae806afee55
SHA512df6cfef0cc148e3f649d3f49941f3fe2dc09fceff14c657328accff9962edae54d13d82c14f4f3a4fe140f8e65940c7b0e7a8c62594b246f341ffa218a10b288