Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 06:24
Behavioral task
behavioral1
Sample
3e4ae63c92e802e41e3715fb54b5bfd7_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3e4ae63c92e802e41e3715fb54b5bfd7_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
3e4ae63c92e802e41e3715fb54b5bfd7_JaffaCakes118.pdf
-
Size
84KB
-
MD5
3e4ae63c92e802e41e3715fb54b5bfd7
-
SHA1
b8ef901d42d7246965ce01b43c9881b74f06e719
-
SHA256
cb0082267c8f8a3d0414f68a787377a35578482c502c2f0dab1b9f4b2afdae17
-
SHA512
bf7efccd9e62ed7bfa68776c9fa74620214170fac8da3a983b4b51bd312e04fe2725a60dba64ab6948b69d89dff269eaac3d44681eadb85ddf19007cc44049a2
-
SSDEEP
1536:5XYTmr/Y//aMRic8WuPh2Oeh8QMdsBrv7v06iRHOIWYVUP3BqfWOpOwrEL/A5tYa:iTa/Yq4QWgh2H8Dd67cLId3Bqcwrm6/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2648 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2648 AcroRd32.exe 2648 AcroRd32.exe 2648 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3e4ae63c92e802e41e3715fb54b5bfd7_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55e53871c643de2067dbff482a4b2eaf2
SHA1ea1fea7647328580c22f91587585f8cb94a755a0
SHA256adfbae790e22a02bee27d3cc5847d30daf009c93806b3bbddf991d8fe15c9375
SHA51289d8b1c546ac6e78d6bc1d9707d399c793f174eafbc93d1b9a313f3f4866ddcdd98d5a1588b19c58726756dc1d7ae06a8359afc729414393a9e482ba52f6571b