Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 02:09
Behavioral task
behavioral1
Sample
91f924ba400722f0a97e48e892a14200_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
91f924ba400722f0a97e48e892a14200_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
91f924ba400722f0a97e48e892a14200_JaffaCakes118.pdf
-
Size
64KB
-
MD5
91f924ba400722f0a97e48e892a14200
-
SHA1
988ccde82796b1a83a50a4c0dd707130483d4e1e
-
SHA256
409dc0fcc28854940dd3056f1afee7201e20e9e17b02bd60739e12bdcc536855
-
SHA512
5c4a9ef6011dc2d2f5c231cf1c499f659a69e0b6252af18ca48ca011e5c0c161946f5cc8b4dcf879393dd22f40d69ae3afa8f98fbe38cf4c5d3d606ce7500a6e
-
SSDEEP
1536:mwoUImXxSXp54n6AxsfUjYz3wQZtEygb/kbhwyq1Qv9o+mPCAzR:CUImXgZQ6BMSpZtfqkbhwove+KHR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid Process 2568 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid Process 2568 AcroRd32.exe 2568 AcroRd32.exe 2568 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\91f924ba400722f0a97e48e892a14200_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD527cd86a598328a9fed86b396972feef8
SHA1d5d5121f82f965bb2afa97550320d8cec28a5138
SHA256fba71a41e0cecf58e39283ebfdefb673f949b5304ae08d54911e33ea3a0bb08b
SHA512d503e6ae708b1937d6076ea29311a8ee30c637bbf25203826f58e99babc0c73f9b714a4f93660d791d4a9c191fd433962745e90b05211c305dc64fae04d4c467