Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 00:35
Behavioral task
behavioral1
Sample
3798aa68124b10f00516796912d4845d_JaffaCakes118.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3798aa68124b10f00516796912d4845d_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
3798aa68124b10f00516796912d4845d_JaffaCakes118.pdf
-
Size
31KB
-
MD5
3798aa68124b10f00516796912d4845d
-
SHA1
dab055900028bce4102e476b157ecb4c369d48cd
-
SHA256
e3d6d60b4b86aa15874ef2ddd2ff536fbab138696528bbcedfb2d369841514a7
-
SHA512
6baee98b51697ddd679f9b38aeb8174800eaa1611e375fd70616cfa3ee58cb42971847ad2bba51fd5885331b65d1f67e13a87a2d3a3540c223011c69fb88e751
-
SSDEEP
384:fYCMWqqt1ZItiWu1mRFZpNvGenbrjQP6bZOWEZQ8v3zE/zNcGEXhFMCUSSwk1ghy:2MgiWuQpNvGPgOWEZKzx06DCCPBmmdd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2124 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2124 AcroRd32.exe 2124 AcroRd32.exe 2124 AcroRd32.exe 2124 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3798aa68124b10f00516796912d4845d_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50c9e87c9e28cf702f79da7412caf4022
SHA107730f083ee930603da41c700ea4f8bda2bdc837
SHA2569ffa5cd2a62d97c6f35eb688d640cf8cb9b2e191d196c8a19c0aa34b436386fb
SHA5126da9e6acaacb55203657bdcc43b15afea137b6af59d0599f8bb1fcc6940eb968b423a696712b0250459432d2d3620c8d36fccc3ba0549e4c12c07dec98e7ac0c