Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/10/2024, 23:26
Behavioral task
behavioral1
Sample
37574d1766cf4fb77cc872da7c3f3ce6_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
37574d1766cf4fb77cc872da7c3f3ce6_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
37574d1766cf4fb77cc872da7c3f3ce6_JaffaCakes118.pdf
-
Size
101KB
-
MD5
37574d1766cf4fb77cc872da7c3f3ce6
-
SHA1
f17693ddbf2eeac909e9d8ab68d65c37f269411b
-
SHA256
4644d85187e0b9f55f8698f1305410725b8db0e037c1ac1129044989e56e7237
-
SHA512
4be6caa96f87d2c41fb9030538205cb686157e0e1a3415ceafdd3fbc4ea6e87d26002a0521504e1eeb6469eae3a07ce7d06d07d18a0cec09a115e90914ab265b
-
SSDEEP
1536:szgYs2wtYw2sT0NNxDteGcgzRzoXTV2eN78FnWv7ypW3ZyWUpO71WbDjNCLPMSY:4FsJtYwv0NXpeGlR8jjt8F5uZt7eCLM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2868 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2868 AcroRd32.exe 2868 AcroRd32.exe 2868 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\37574d1766cf4fb77cc872da7c3f3ce6_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d8c4350da4732b097dcec86d43146fa6
SHA1961abe506a28d5699b7a1ad665480ce12abcc412
SHA25605fbb981ade9c7d07a1ee7cb1108e4deaf0ed8932bd65ca08370c62aef02a435
SHA512d3e8240d4f1b56f2a54a6c03b52ec97887f4d111ef98be5ed20d9b05efdf0d16b1fb17d55a418cc87b4effbb8e95112aed6c3c37155bf5cab150e914c5461497