Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 02:05
Behavioral task
behavioral1
Sample
91f4aa9b2518e03e82c6e19067a1dc14_JaffaCakes118.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
91f4aa9b2518e03e82c6e19067a1dc14_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
91f4aa9b2518e03e82c6e19067a1dc14_JaffaCakes118.pdf
-
Size
83KB
-
MD5
91f4aa9b2518e03e82c6e19067a1dc14
-
SHA1
95cb3fadf81781e9f8b6720c0492e56362cdc43c
-
SHA256
d88fc5ac62bb550dd933593f14b0064fb0ab7779961d668f266cfe0fdbf021ac
-
SHA512
b45aec1255c9694227f2039b627958475c50d331743310620b95d83b7cd11b1d96732aedde31813734a252f22a2aa3a38473b8333ecbc41f2b85ac91cd85cd01
-
SSDEEP
1536:RkWfYCQJv2WepngdNsTTbiuc3dqRi+LlGFNX8WLAAME25pxmmguWspORSXDsXg:CttPynZVc3d5+UXIE25p0mgBRSTsQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2328 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2328 AcroRd32.exe 2328 AcroRd32.exe 2328 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\91f4aa9b2518e03e82c6e19067a1dc14_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51c22878bb198758c6e2f7c44f8bcd933
SHA1ffc78de905598567bdda800382134b56e4c2bb38
SHA2569b95e082ad8ba08c4fbcef5a1c3d9cdea5aa52415d449832db4e83bbb8e4585b
SHA512465242379fadbe1eb3c05ef233420717e795a887b37809e4bffaaddd836e5ed0f6702b5b9f74d1a2499ec1a109a6e7e057871960fdfeced54711bfb193b7e22d