Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 07:16
Behavioral task
behavioral1
Sample
4672326581628f6eaaeeeb511136fa52_JaffaCakes118.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4672326581628f6eaaeeeb511136fa52_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
4672326581628f6eaaeeeb511136fa52_JaffaCakes118.pdf
-
Size
72KB
-
MD5
4672326581628f6eaaeeeb511136fa52
-
SHA1
95d93450819e9804ab6c3c6b7eead9337ba8fb6f
-
SHA256
09d71189da7ca0affa43b55b40ced61e5e691123b77ec45cad199b00a036f290
-
SHA512
30c86338c325a0c13ed933454e8702d7fccf9011ffec94fd186cd576e8caa82cb7716d19c6c748a1282367f675d1193e181ced72f14f5fdfcea088ab459c72e1
-
SSDEEP
1536:cNR4QRGhHbwuAZTvXjWr7Ole3r4HP9MhExBaqGZ0atsE86v2e/YybNhAOxV02eUB:iRuAJvjWe474v+s5Gq4F7lb7Rxj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2172 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2172 AcroRd32.exe 2172 AcroRd32.exe 2172 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\4672326581628f6eaaeeeb511136fa52_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5117a18af372563ed6f491d06e1bfaeaf
SHA117113ba1a41737f774c5379a6ba6c8b3117110d6
SHA256936fe8aa0f300daf895d00abec7623e5a1835669f882c1c8fd5ff1febdc582ed
SHA512d5d34f0bd8582a20ad7da6bc7cc8d16c63704d19861eb0bcc067963df068e8c4b129b508298d9f1885ab376e261f67d45dd12c061f89ea1a1e751fc82d912761