Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 02:45
Behavioral task
behavioral1
Sample
550d315775048b061f87e401071fadbc_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
550d315775048b061f87e401071fadbc_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
550d315775048b061f87e401071fadbc_JaffaCakes118.pdf
-
Size
41KB
-
MD5
550d315775048b061f87e401071fadbc
-
SHA1
24e1bbd4be928d084fc635df7ac7f16663b4d841
-
SHA256
357c8b77c6f143134cb6bdab251e267303ff7c1367e3a806b936199061b462c0
-
SHA512
117be2d3b51da552ba58cd1f24faa6b3ba99461d710abde70a7a0dcf83ac6b48c20271fbe44a7dfed0a32488553aa32ea0e308b41b39cb521cb5eaf96a9919db
-
SSDEEP
768:/gGzpDfg2wUSQiLO8oqTqEKn8gCoasv8IW/2IeCx5lH0250R:IGFTgicqEQ9EIWuIbU250R
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1920 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1920 AcroRd32.exe 1920 AcroRd32.exe 1920 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\550d315775048b061f87e401071fadbc_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5357676e9592b86e7ad0c682046f98549
SHA11bd2fd3ed993e6b1dd394ab95ea8cbe345622f12
SHA256990e3863a57c4a8ea19d40a2d915a172d2b0fdb47dbec5b96db0af5669193209
SHA512d57a99e120484c9c8f4c51017525735f91c70b42af36418cfb174478df29a6ef9723eac8d208ed1f5713c19017dfd94b08d2c0d2f77642b2c633811fdfb2ffa8