Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 17:18
Behavioral task
behavioral1
Sample
411c93541a215a9033b1951dbd92c914_JaffaCakes118.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
411c93541a215a9033b1951dbd92c914_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
411c93541a215a9033b1951dbd92c914_JaffaCakes118.pdf
-
Size
79KB
-
MD5
411c93541a215a9033b1951dbd92c914
-
SHA1
07496d186d1611ffa6924c115866ee9eebd50ebd
-
SHA256
987ff48800778e606359a936f96b775d129783c29306fb439ce49d91d159583e
-
SHA512
a9d2b17b353bf2fc39f1c6706d00462e1c6723c4564a9309925bbc022924fbb9cd028e4f1c0603a261e78c78c9ce0ba081e10d376700186b3f1f36de3fbee8d6
-
SSDEEP
1536:32N95sjWAezMKFpufcqM+zCFelzdClxUJvo+knMVRatW1Yj7AGyQWapOnTyI:qnnzMKF6c2zvlRC/UJfkn7qEAFZn1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2708 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2708 AcroRd32.exe 2708 AcroRd32.exe 2708 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\411c93541a215a9033b1951dbd92c914_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59f21f75d8295636fb53d7c6a7e14085d
SHA1031301efa8fd0ba1f8d895205c44a2b7b06fc297
SHA2566eddd96a651dc2f4ff4b9cfffff16d1af21e86c58d3859680bc5d01d3c364026
SHA51201243b9b39093c218690ed1d3f738d0720a97d533aa9c657c5ad69bf0406cafe23f25083da6f659aa4beaecca5f86bf5830003af75bf64c78e686fbfa24e1ecd