Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 01:46
Behavioral task
behavioral1
Sample
91dfd37403fccb3d6292ae8a89c0370d_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
91dfd37403fccb3d6292ae8a89c0370d_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
91dfd37403fccb3d6292ae8a89c0370d_JaffaCakes118.pdf
-
Size
93KB
-
MD5
91dfd37403fccb3d6292ae8a89c0370d
-
SHA1
2f3834f1adea86ea408d12d6415434c71485fa52
-
SHA256
e5492d09c61b910a7c94656a0c791e7776910ba4ad7fcf978b2db5e929d1f62f
-
SHA512
409554cd8644b1960fa5f6dd0e7a7140c039fb169dcc8f2d476d47d46fa187f0984aec48b717032ad4bae71c954800d10545c74338399c3ff9f9f89cad10c318
-
SSDEEP
1536:KDnbaJ6EoDYLSv4xFLN3Mk4PPSGlqJ/l/TV+W6pOu26WdgO5cNia+XP:kJxDRv4npYP74/P7u2sHNF+/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid Process 2700 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid Process 2700 AcroRd32.exe 2700 AcroRd32.exe 2700 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\91dfd37403fccb3d6292ae8a89c0370d_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5222c7f5cc260928c862fb22898feab51
SHA1eddc256f2b4ed8d721dac9e68909736f4479485b
SHA256862357cfc12eae20c4d00ba232d57d0ac72511c200078e6ecb9fb3e8087f7d67
SHA5124ac60688b2a394531299f4736258518fd3bfe3cdd949a28849f425e3704e3ba24830c2ab84b02e7ff5111fc861fe82554ec71a9fce296914cbbc8083ab08a1bf