Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 09:46
Behavioral task
behavioral1
Sample
3960a5a5f69eea7f914cf9f73bb2b685_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3960a5a5f69eea7f914cf9f73bb2b685_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
3960a5a5f69eea7f914cf9f73bb2b685_JaffaCakes118.pdf
-
Size
77KB
-
MD5
3960a5a5f69eea7f914cf9f73bb2b685
-
SHA1
caa5c5f321c3b56256c3d0067c32bf6dfd6e6210
-
SHA256
6b303c9260d2c4302131bb7ac2fce42b969582ccb0424557bb07cb0fe980adea
-
SHA512
70cf42091ceb00bbafcf65238665eb7e27c7f583a00275ef53c389d323f56205403ca003e9650b07b8b24f4f74558693058ecd8cfdcacfeeb845fbee5bb3bbe5
-
SSDEEP
1536:nK1/zGSgPqdr2P549b9W+wUisQpdyPAPoyK22Pt3WGtrLd/b:K1rGSN2at9W+BKfCYoyK9l3/tP1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2084 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2084 AcroRd32.exe 2084 AcroRd32.exe 2084 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3960a5a5f69eea7f914cf9f73bb2b685_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD503c46c7d0eaa955c9953e933a6561905
SHA11e62afcae6d81904c050392c207f7a8350fe78ac
SHA25628ed4959d6d485a90627bfeb9f170eecde497c7298c03bc3a9de7eb9767a745b
SHA512cc459f8652bf7522db98f27bc0c6ab5acc394c2b6884eaa9bd50c50b0aae6d5b4394d75f8f43a9034973dc4af9bd8b8afe863e9403985a530218c3dc7de819e6