Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 01:41
Behavioral task
behavioral1
Sample
54c757050d69c53bf0504a9c03b706da_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54c757050d69c53bf0504a9c03b706da_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
54c757050d69c53bf0504a9c03b706da_JaffaCakes118.pdf
-
Size
71KB
-
MD5
54c757050d69c53bf0504a9c03b706da
-
SHA1
086df044dcfd01834148e60d6ac9c3d1eeebd908
-
SHA256
ece719646ee6cce4dc69701f3f2bd0a648074adb25f90a81e170eb3f6d18038b
-
SHA512
8b6240cbe4abeee4b4f880e1e26eb828bf6cfd2b91e4aeca20381be54870a41164bed4f4c5944350f20bce4545b2a1f7e5de43c860889b96904d0f36d7a5daf1
-
SSDEEP
1536:uKjMyLi1G2Ds+JLj8bIV0bzC4Yn0ugEnWAsQi82E7DH4bWcpOmEP9:h9L32Q4LAITbguRi8tYamQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2896 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2896 AcroRd32.exe 2896 AcroRd32.exe 2896 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\54c757050d69c53bf0504a9c03b706da_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD576ff55ce6b74b8d0be94207266a8ac2f
SHA1110c04fbd6519634e246b1ef291e439734c2f499
SHA2563dd4a9020b605bed968eb235d2e144353f6eeabdd455d16f71f3d486813d5c73
SHA512b3f0eeb738bd47be767859c358da7527fb639092a9f19e8e809feeeb61881551ee20dde97489c1aac31abb7ecd0c7aa7124d900e6a2c6edbe8296b1edbfa9dce