Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 22:36
Behavioral task
behavioral1
Sample
5413e2affa9837a127f0bcfb556aa214_JaffaCakes118.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5413e2affa9837a127f0bcfb556aa214_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
5413e2affa9837a127f0bcfb556aa214_JaffaCakes118.pdf
-
Size
44KB
-
MD5
5413e2affa9837a127f0bcfb556aa214
-
SHA1
eec8abd3ffeef24a6cf61c256194fde121c51fdd
-
SHA256
5d468be75ae736182d4512c1ba8621207cc4470401424615dd4fe335c66374a7
-
SHA512
3c1dd6a21f76e3046c8d06132585da25c5261ff05c61ff45a18eee9bda0ece09f0006c73ace153d7f8bce2e820d2b94866c946e7bbd6a78125038bdadb142ea8
-
SSDEEP
768:bJ3r3C4WsWmv2P4VAoUr4UPYyy5uZDZTp+i1sUhD1:bB249Z2Qm45QDz1Hhh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2956 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2956 AcroRd32.exe 2956 AcroRd32.exe 2956 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\5413e2affa9837a127f0bcfb556aa214_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD54d896d7a902b0dae6e001bf206bf3181
SHA11bc557647d546fdce4ee91d25f4502e9af040ec2
SHA256222b20ed69b598b3bc8f2adfdae82645d17d457ede59fc12fb00032bcb530b2d
SHA5123e85ef6e5db240265de2b1ba71cb32d7b2baab9a1a141ee924c9827fdbf812369afc8c52776ffe47fdd5f610266989c55d4d7812c591f9f271514131c70b40b0