Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24/11/2024, 02:07
Behavioral task
behavioral1
Sample
91f6a47e4a9a55cc3d54aff374072520_JaffaCakes118.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
91f6a47e4a9a55cc3d54aff374072520_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
91f6a47e4a9a55cc3d54aff374072520_JaffaCakes118.pdf
-
Size
81KB
-
MD5
91f6a47e4a9a55cc3d54aff374072520
-
SHA1
58fc7dd86b21c80a324f4f04bd8ae50c1986a605
-
SHA256
84d8c63e1270c70d231a41562b9c1cf901cce73c85d21a5dbf3234d1e75fe09d
-
SHA512
1488a4fe0c0f154a6568661881677010c8dc4f6b36e8f6f88e49abcf9b6fdec592b787147e1aafc022280690d4a44e19a556de7f711570c5d7c76606c7f5713d
-
SSDEEP
1536:rBucfqYat402TotDgF7+1sbn3umwoKTLAZYoBMOL0Whkh74R1ye4iWspOR6wH:gX92TotKs0n+joyLyRs8Ie4FRz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 388 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 388 AcroRd32.exe 388 AcroRd32.exe 388 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\91f6a47e4a9a55cc3d54aff374072520_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD555983ce61280c13f42c26e642ae0d44b
SHA1f2c098b8223d19431694490c6c890b66909d7a1f
SHA25696fbd26d66edd2e9623a6efb2941c79fdcc33b42f29e67e314375b19b178f210
SHA51253f036a547441577fc3036001f0a385d001263b9ce75671912104a74bdcc2740ad5903105af0a4f1ada932a890b437ca9378e633c7ddcf68371d8fdd7aa0845f