Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 03:43
Behavioral task
behavioral1
Sample
45ab2ce29701f4c43da2658ff5b58e0e_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
45ab2ce29701f4c43da2658ff5b58e0e_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
45ab2ce29701f4c43da2658ff5b58e0e_JaffaCakes118.pdf
-
Size
87KB
-
MD5
45ab2ce29701f4c43da2658ff5b58e0e
-
SHA1
2a8e3ceeff265f89cde0a298f3b46ada8ff443c5
-
SHA256
ada23639370119d773b9b444642bd03d919f74a671dec3b8c7a8ce9001de2b3b
-
SHA512
2a6a13be9542ef1d762dd5b4b277cad1d2b103ac6f408a0b4446e2b57d2922f6d2faa081509e3175c0d46b690002f660a376fbcb89bdc73a50da92f19152fdba
-
SSDEEP
1536:3Bhxx5/vsOpnaRI4zGQv+oQ99SaklhB/oiUOWeTXpWHpOvTWv9ItLup6gTRlJ:RXxhUOhf46q+oQ7SaG/IdwXXvcdp6aB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2100 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2100 AcroRd32.exe 2100 AcroRd32.exe 2100 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\45ab2ce29701f4c43da2658ff5b58e0e_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5909faa185caf48e8b0cecf3c418242dd
SHA12aa2db41add295d8a82e2a944299aedd5a6941be
SHA25681110ec7ea1ccf42a3cd877bc0e50c1895b80235c4a6d392e892dd741bd0763e
SHA512a03b15b1e43ee9531bcf722a825ecdf088c429f0cde65ecf2e2fd14d707ae32f9deffe2264f56cce00d594b6a82f23e2d608d79912406e789d41e2d62d9d375a