Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 01:17
Behavioral task
behavioral1
Sample
91c007034e3d24b7859f0397422363c4_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
91c007034e3d24b7859f0397422363c4_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
91c007034e3d24b7859f0397422363c4_JaffaCakes118.pdf
-
Size
89KB
-
MD5
91c007034e3d24b7859f0397422363c4
-
SHA1
96a215c5cdef347e6ed5c1ef7192898d20184a2e
-
SHA256
ee0e26eea5d59938b950dc733d3ab1f9aaddaf84be5a2adc16cf989c49e43a2e
-
SHA512
657e9d70122ce75041430eb2cf1c1f7d80f98e597e044a12fd1597de50c6fc36959500b3daa82f669ff1d18f86055189b620f5ab45d4399c9b1bb0dc7d146c1b
-
SSDEEP
1536:WtEfelmeB0jmG5Qe1F5ih8VuyELHhAam1KLlINLVGlUYghazIaqOgFdWCpOVioAr:r11mG5Qe6JDAamoLlInGlUMxfLViZeBo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2084 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2084 AcroRd32.exe 2084 AcroRd32.exe 2084 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\91c007034e3d24b7859f0397422363c4_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD50edbb0ea3ce47e30061fe69255f23d46
SHA1a64db1953aa26ae758c36e841843e94be07d17ed
SHA256c8e3afd1ce366d2bad9f11161f541738e39a956b7a29fefeac50e3fba9467572
SHA51260196b7176fd4ee1aa164f8f20fc6f231153bc09354a5019f5079b6454a6daefe5d026385d2d10cb089914fac01826eb131a174d231e908754654556f5a24fda