Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 04:27
Behavioral task
behavioral1
Sample
557a5f242406bab256535587e8d30b0b_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
557a5f242406bab256535587e8d30b0b_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
557a5f242406bab256535587e8d30b0b_JaffaCakes118.pdf
-
Size
33KB
-
MD5
557a5f242406bab256535587e8d30b0b
-
SHA1
81b096723ceb3b2dd6148000b4e790800b441eaf
-
SHA256
984a28c1cfadeb608ef56a6dd2c5afe5a5e0d14bf3f77fa0788e8d6eb2ad34fe
-
SHA512
b08ef2fbc78bc8401281fbd86800e54ecdd50524b20a67ec579f6957f11ebc3f425156d183404aa3a755ae206ca6b5e34b782513ba99c97108c58481422a5dcd
-
SSDEEP
768:HxLQCrRnjxUu1PKlJfNt0y/Bh6Pi/nAOIxaXHKd741tNXo7Qi:RL/ln1Uu50t06BQDOIx0Kd81jXo7Qi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2404 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2404 AcroRd32.exe 2404 AcroRd32.exe 2404 AcroRd32.exe 2404 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\557a5f242406bab256535587e8d30b0b_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b1a2a8c2f16e0c192278f63573865278
SHA11a4e82813b00d1f7608dc13fd8994be57a1be5d9
SHA256653bbef22aa955f50122ca782d21b621097ce9173ee9568d4aa8d925d9420c42
SHA5127d55f574ab03ee065c39aedcf7ba69065b9cc8096a05306fd8717d45dcdd72a73c8b55bcc2f1594bd32e8aca43448f356cd1a8743caf6c469cffbbce09ffe671