Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 11:57
Behavioral task
behavioral1
Sample
3fb8c75018d8ba2e96425f4e3a6f792f_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3fb8c75018d8ba2e96425f4e3a6f792f_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
3fb8c75018d8ba2e96425f4e3a6f792f_JaffaCakes118.pdf
-
Size
105KB
-
MD5
3fb8c75018d8ba2e96425f4e3a6f792f
-
SHA1
89ba25b9d3273ea46b88700860c051eb5d44a99a
-
SHA256
bb2a31aec966eeb706d415d777f8f38f9d7a9a71cbdd4ff2244145ecbd6abec0
-
SHA512
af99f13bf5e8442129dbfd8c327cfd36dc1fd3f0c14acbdf2ec3c157db9cf97cb40343ca23db0d90fad80d44d84e1a6d07cfd30a892f1e30edcb5499a5333ec8
-
SSDEEP
3072:TEgPenQnxeco/YJ2D4Y1xZOgpbiMINyhbWR789EDWI5Sdyx:TEgPenAe02D4Y1HOgpEoN9aR5Z
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1988 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1988 AcroRd32.exe 1988 AcroRd32.exe 1988 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3fb8c75018d8ba2e96425f4e3a6f792f_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bc9b061e0bef4f14c240e8c8f1ac1bc7
SHA166d34953484b04a0ac2feb6b3450a0b2ae2fca0b
SHA25611b98d4c744f11b6f8275d85d18bf845c51a3185cf3e6278c6f36a3d87cbd1d5
SHA5124ac0f580fcd02e7a5554d6ea5a4ba94a61f2f074df37336558980b65d49374cb2ffe2ba128c448e941af55bd001047e0d0f27d9f6040df9e4c2c109e4f4dac55