Analysis
-
max time kernel
92s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 18:40
Behavioral task
behavioral1
Sample
5320d0fcf3daa16f8550bc99384f432f_JaffaCakes118.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5320d0fcf3daa16f8550bc99384f432f_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
5320d0fcf3daa16f8550bc99384f432f_JaffaCakes118.pdf
-
Size
80KB
-
MD5
5320d0fcf3daa16f8550bc99384f432f
-
SHA1
2e3424ce19dfd6688d4b76a401f8e3c54b61650a
-
SHA256
cb45ac8fef3120c320f123847f9cda033eefc453f7af824d36d0e8addd37dd99
-
SHA512
ca72e66ff7d8d3c4f7c43c6cb052eb70104d447f944766dcb45819fd1aac8367f5f6f7c7e23adb3235cd81dc4d17a3420835d5214264da53f979c646529b0663
-
SSDEEP
1536:M1KAt35Rk7iFwt72cZtxxj8vO1JM8YArzzDlkuALlSMep7yGndv/eRTK:01f2dTnrj/YuW27h
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1736 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1736 AcroRd32.exe 1736 AcroRd32.exe 1736 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\5320d0fcf3daa16f8550bc99384f432f_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c8db8b8b55ba3d17fd3f927bf1129b82
SHA1b16106dbdb464b79df1556b39cb0257e016a9519
SHA256ca39e3ef4500bfee8b5975ad4a00fb65b6e45c58dae28f1eb954fa6e04630884
SHA512a82c582d90267d8a256cdfa70bec3c186b5fc25121500f35f751ceeba13ab2aab17c02006b6a4f86d35eaee9dc691f465d7cb7b103b46ec66d758958efe4fb4d