Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 09:47
Behavioral task
behavioral1
Sample
2eefc16807f8e8d0fdaa9b9e6557b7b1_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2eefc16807f8e8d0fdaa9b9e6557b7b1_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
2eefc16807f8e8d0fdaa9b9e6557b7b1_JaffaCakes118.pdf
-
Size
74KB
-
MD5
2eefc16807f8e8d0fdaa9b9e6557b7b1
-
SHA1
32c317d2bb9853819b36bb786b87df6f67d0637a
-
SHA256
6603f0ac6c585e25430b48d139bb2cbaa10e7799b84a8bef97084caec47e526c
-
SHA512
d6b7dfb0089515308188356b540e5bf70244d8fe0e5a9d1b5906420e973756b46298e38f2848d60d42857b736ff6b53945b7a9b4d5554ac1fcf5d8b4e05161d8
-
SSDEEP
1536:ZrrquvCNY6hfkq5lz7pDylQ+k5u6WspOR3VdWzPUpp5Q:Ke0fhlz7pDylxkkdR3V+spk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2108 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2108 AcroRd32.exe 2108 AcroRd32.exe 2108 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2eefc16807f8e8d0fdaa9b9e6557b7b1_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD555932ecf751ff0954dcf45b68213c637
SHA1b57f91ea1fa8df4a1af37176f6e1193ab8b91033
SHA2566e3ba13068f460e1d540597d5e0650ca727078998985fef65ee9a530f09366e1
SHA5121483130d108399683f4646b033ffbfd5517584c40f0905fba206b63aa8fde7b3e22b51e5730762947333675bb6e29a168a43ac76f4759f8167f358c44d5dd333