Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/11/2024, 02:11
Behavioral task
behavioral1
Sample
91fb94ab511761ad87fa4cfa43d8ea2a_JaffaCakes118.pdf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
91fb94ab511761ad87fa4cfa43d8ea2a_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
91fb94ab511761ad87fa4cfa43d8ea2a_JaffaCakes118.pdf
-
Size
33KB
-
MD5
91fb94ab511761ad87fa4cfa43d8ea2a
-
SHA1
80125eb226c1055e35b65a8c554bd9602e7ae241
-
SHA256
7923f6f7db24a524ce30d21e4ff4691405a5f56d0ffa87b289f364cab470cc07
-
SHA512
4a70ce21b01e6388b2b2553ed8cda6a25f02d0e4a5aef5ce232eafb9697cbb9cb44191fda288ac212b04175bf1d8cc3b481035c135aaa57d009ae9742d761b02
-
SSDEEP
768:bchH9UGCvxTOqzjKtJMsgFA5N6AGMvLWI+fW9G8:YXzfqmmA5N6CvLEEG8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2432 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2432 AcroRd32.exe 2432 AcroRd32.exe 2432 AcroRd32.exe 2432 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\91fb94ab511761ad87fa4cfa43d8ea2a_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD541e5494bc9647f4439830615f863e209
SHA15be26f3b39b430cc315ed91a92ac08025e98f1a7
SHA256f24ef31bff3011077abf8a1c88328851c46b5830b2c628aa5101ff894e42d9b9
SHA5123ba34f5ee9cb993304eb99dbc959ab72ab03dc9503d5055746701288f4c7fe27c38d4f90b1de23cb4199bddc7570ae56e6fbd8e0b9475e35d8567f0c820de845