Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 13:24
Behavioral task
behavioral1
Sample
3a3e3fc4c2ee6af68e63a4c33c3c5524_JaffaCakes118.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3a3e3fc4c2ee6af68e63a4c33c3c5524_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
3a3e3fc4c2ee6af68e63a4c33c3c5524_JaffaCakes118.pdf
-
Size
86KB
-
MD5
3a3e3fc4c2ee6af68e63a4c33c3c5524
-
SHA1
4a4fbef5ce5cf202f1da1c1fb11e17de7e1de35b
-
SHA256
2cf85feb1dd0cfa71c2d5d1c71edc8c5935146e72c4c72ac9472d396b6593a6f
-
SHA512
89ce3a0221d207ed16fce5504b0696383de3728664e5c5eee7cf6489c6a8f78ce5652ca1a83bdd10db1c0bbb35b1ce99c6b28538f1b6040c421e15c4cd1a4458
-
SSDEEP
1536:YLSd2iqfcGM2JQIW2casjV1l5DlLmC1OCRVcW3YUFmkWspORMqci:N2De2JRsjV1nRL3OGVkUFmfRVZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2880 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2880 AcroRd32.exe 2880 AcroRd32.exe 2880 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3a3e3fc4c2ee6af68e63a4c33c3c5524_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5871bfbf04470f6edd026f82abb47e368
SHA1a76dee928a3ed1a52967cb0fd287b5a589e554ef
SHA256409973513008156b3fc0f0fbc69f26e35296a8d83648ce44a4da83e2dc372384
SHA512ede9c26a5748f4201a670f39eafc37e744b9c85a5ef709962958deb2d1ebd0367450a43f3733e56021e3364dfe1ef74a2641926a53b7f0f2dce3b58121eedceb