Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 11:40
Behavioral task
behavioral1
Sample
3fa3eebe73694320269f890bd2f87623_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3fa3eebe73694320269f890bd2f87623_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
3fa3eebe73694320269f890bd2f87623_JaffaCakes118.pdf
-
Size
91KB
-
MD5
3fa3eebe73694320269f890bd2f87623
-
SHA1
65b7467aac102ab26dc8ecbf912934421ac8b32a
-
SHA256
983f1cc061ef756af2fc00f090b37365b1cf4d3f8737d6dbfde95cc246139021
-
SHA512
7382616be8e321f31885795dabe36c4d1aab9e7395f9e9b979c5f0210a939952df308e1651d43542f08f9dfd53663aa3a6d93592879335806b0830dd235d6c6d
-
SSDEEP
1536:P7c9KWu52chwSYEZyOK1atbkX9Tlqf+lx+B3tb/uIzWlr2y/pqOQMWCO4AieFrJ:AcWu52QRK1kC9cf+L+BtbmI82cpTQeYt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2504 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2504 AcroRd32.exe 2504 AcroRd32.exe 2504 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3fa3eebe73694320269f890bd2f87623_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53bccb5cb5ecacd1c66fe6fe62f35243c
SHA1b13695a1475a312e7b9297760048d2b9e424fed2
SHA256e326baca152b269e20829164c2103bb4152db181858666eb3e94de995c88678b
SHA512ab0e28684b0d54ccb1b110262db4f009c7c0dd56741a016863ee49df8b2448afce549d64771cdf0ad61eb3164470231e248ba875f5e33b0196624f5262b3e186