Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 01:56
Behavioral task
behavioral1
Sample
54d88490d08e077275c470e4bfce3051_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54d88490d08e077275c470e4bfce3051_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
54d88490d08e077275c470e4bfce3051_JaffaCakes118.pdf
-
Size
81KB
-
MD5
54d88490d08e077275c470e4bfce3051
-
SHA1
5c3ea87eec87238a58fd32ab90a0851e8617c479
-
SHA256
ad55119c68c44bd0f204f6a327fdf18ecd0c40d5100ff444b547b59ef8383d90
-
SHA512
b695fde8325ea2a79a93bb781191533285dff84afb43d2e1c802dd5adc9e5a898cde254d37ed14013d620b191e165d35ce375c93904ed4c48ad08324c958b769
-
SSDEEP
1536:+NsevDy/k3ZTqMGfF75dQ7uodFn8ci7FB88WxSW0ULOM8/TM4WxApOGBr3Kpad:te6k3ZTqBfCuodFn8d7FBEStUX8/IR3Q
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2668 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2668 AcroRd32.exe 2668 AcroRd32.exe 2668 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\54d88490d08e077275c470e4bfce3051_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD551f599068a00f492eaf6f059f98e5265
SHA1b19d707f160785e9aea3de4ecb5288df4f0c0469
SHA256fd7e7d36ca2fe9c8af88563bba56767b0899f9815e8fd2ea134c80f2106294f8
SHA5120e00210cd11f3cf0e4e780929e5505424bda34d4171ab8ce282a6d191243c5bfdaac8953fab38e57a13e15d18d827dd454c34619dc5a90117658036b5412da18