Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-10-2024 20:02
Behavioral task
behavioral1
Sample
6bbcafc22741242c43789d4d95b43811_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6bbcafc22741242c43789d4d95b43811_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
6bbcafc22741242c43789d4d95b43811_JaffaCakes118.pdf
-
Size
13KB
-
MD5
6bbcafc22741242c43789d4d95b43811
-
SHA1
aa445824803d4a22ca98772a3a2e07dee624b81e
-
SHA256
fbc1135baf2f0ac039b3ab47f872119c1cf21239a3a2c9f643574d729d3aabb3
-
SHA512
a5bf0c8c9011e035f795fceb44f2583000404eca7ea8bc9dc6fbc2bcee8d02c916240671049cd6ad749121dc5573989b721f22ffaad602f6890c73b17b407a2f
-
SSDEEP
192:rQhzajYqwAO9G+/vvTs7hXbfym4GJVbBftJy/suiXAO6vQNi/60un/T8qvROdjzJ:shzaNwAO9GiM5fdttt4Qi/60G78s4djN
Malware Config
Extracted
latentbot
ratbiiqbtal.zapto.org
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid Process 2876 AcroRd32.exe 2876 AcroRd32.exe 2876 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\6bbcafc22741242c43789d4d95b43811_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2876