Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 13:35
Behavioral task
behavioral1
Sample
3a4baa38b6048fe9232b8d6434fa2a9d_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3a4baa38b6048fe9232b8d6434fa2a9d_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
3a4baa38b6048fe9232b8d6434fa2a9d_JaffaCakes118.pdf
-
Size
118KB
-
MD5
3a4baa38b6048fe9232b8d6434fa2a9d
-
SHA1
381682aff0eb22dbfe882d3ad8857520a68b781b
-
SHA256
2ba3c672db967c03b6475f953741bd51454bdf513823f31ce411fa28ac4e2eaf
-
SHA512
0e1365fb0150a26fc4964964cc2b29bccf206d073ce62da8272a33fc8dc125c27430a323f3a6d132de05cbedcd4a398737e1e1bc14d3b19c0b3f1fde5a104f29
-
SSDEEP
3072:S4zKjpQXNgeelHPFwmuWaZfuCFR4shDYaNI9:DzKdQdgJ9wl/FRs9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2332 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2332 AcroRd32.exe 2332 AcroRd32.exe 2332 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3a4baa38b6048fe9232b8d6434fa2a9d_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD536f773f79fd083c458c1ec0ba576827f
SHA1fada16aa8290f5f4e67684e708dc4b10c1b106e8
SHA2569ead37f5494c3b156dcbdcee3584c995108acaf2f86c5ed935d80d9e3927e30e
SHA51282c41dd0034b7f165329ba0da0923c05eef1d4c8ee9da9eb8d128c8c051099c80481e4fe9769ee0f009428bc841bd73a24ff5c9a9c8b30686a0d0baca86ebc4d