Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 01:39
Behavioral task
behavioral1
Sample
91d8723a5ced0be071fd050c68ce33e7_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
91d8723a5ced0be071fd050c68ce33e7_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
91d8723a5ced0be071fd050c68ce33e7_JaffaCakes118.pdf
-
Size
78KB
-
MD5
91d8723a5ced0be071fd050c68ce33e7
-
SHA1
5566e5290ab0dd9fa4dadea272b8d832e947f8ec
-
SHA256
551a359d9c0685755300a56838e3eae8574589ab1d56859f123d626a9946645b
-
SHA512
b2e143035c01d27df33a8b86be4bfbcd41d50a33b7279108da7f9f5c7b046407ff5d31f3c235a48a0a439d10dce5b63de5c7c96bcc064b19a839e72b6d1a4549
-
SSDEEP
1536:2hKpXHWoLD51C9q2ZZwMWaU6EJ5s1V3iQ0pfnYGMW29+VoHWepOyyqa:aGRD5E9qBaGJ50yQUxwMokyy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3024 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3024 AcroRd32.exe 3024 AcroRd32.exe 3024 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\91d8723a5ced0be071fd050c68ce33e7_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5372102c82ce040f2102f4d9109b73674
SHA15430d252199572d389d529dc987788a2be222627
SHA2562635eaaa134272d1d44fc0c095acb856b7a8447b5a42b47b38fcd42c553b5c81
SHA5123a4e5419d01c11b4e6a220bfbb0ceb284e037050f6b4bf70d45c37a79adbd3a8a3068e4ae51639597c76f92006096cfba6551917d6129a1bbd7a9fe9a34d3154