Analysis
-
max time kernel
94s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 20:48
Behavioral task
behavioral1
Sample
53a9504fadda35bc6ed5209c9b12962a_JaffaCakes118.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
53a9504fadda35bc6ed5209c9b12962a_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
53a9504fadda35bc6ed5209c9b12962a_JaffaCakes118.pdf
-
Size
69KB
-
MD5
53a9504fadda35bc6ed5209c9b12962a
-
SHA1
a316f3990f8e937a5d8965d1a20400a8a064d599
-
SHA256
8c763b4e93a4c9247e4aab1582464d752a3dfdcb1296106af970b09040458b8a
-
SHA512
185a44f675cffa4d1991cd0f29b3a03da9bd3c0a17e09d154edbb8e60d228b00c56d0fa10ef66e2f726d22ef0da3914ac214e8f3fa35908fabd278b3e5062f7b
-
SSDEEP
1536:DaLT4OMJxSGeBsaAdOCxtGxc+oikxtUke9VC8UFORbS9SsDf3:iIzSGetAdOCxtGxc4k/e9VC8mAGP7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1520 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1520 AcroRd32.exe 1520 AcroRd32.exe 1520 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\53a9504fadda35bc6ed5209c9b12962a_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c2e761d84e6ed70cbc281cfb3985084b
SHA162b4c804a4a5d6c90a6bb655264c7148c54bef53
SHA2568b0f890ad5e46bbcd7e71a95961930f1ce2d4e5c420dd04e2dab5d5e10ca27fb
SHA5124b85418f94771b7a5ea12835bf4fefd07e1ede8b17d41e9350f0d44f119e571b3f36f685ac478a9be1d51910dc17b37f8d33983d4863870cac25aac7cbd6bf97