Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:14
Behavioral task
behavioral1
Sample
b4f0e69dc44dc5ee97526d4a3e327fbd_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4f0e69dc44dc5ee97526d4a3e327fbd_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
b4f0e69dc44dc5ee97526d4a3e327fbd_JaffaCakes118.pdf
-
Size
78KB
-
MD5
b4f0e69dc44dc5ee97526d4a3e327fbd
-
SHA1
a8f5caf3d815989a2b77fb98daa2b252f89af15f
-
SHA256
2b925db69ff740aa15ff19e00c60cc393bbb93579fecd73c5e8943a10717eebd
-
SHA512
1d64812cad92636a71ceefa2eac6b14893c3630f5297c4b229d8b5b5e06b1b76a85ca0f55c4dd61cb2007cc725651bdc5dba34b2dd4c41f930b10da4744b9b16
-
SSDEEP
1536:QG6Pz3hqeZTF9mcugvsrkM9+Qq88Jz7EYxzkLHjgWD66wlSYK8j0Gy7W8pO7veT:x6Pz3hqez9ygmkBJ8Y7BxoL66wM983yP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2672 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2672 AcroRd32.exe 2672 AcroRd32.exe 2672 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\b4f0e69dc44dc5ee97526d4a3e327fbd_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f685643daae1578c1ec9c2ee2c0b811d
SHA10afe32fc20765ce9c06e6ce37dd1aa71ff8c58dd
SHA256bc0172550260483d05edec84eb7fb1aea5a2b0eb17c6cb40a210f1d5eac3200c
SHA512414f470fe4b839d31ffa215b68911d38a21b8fbe602a5eb97868a178240cf9ec252b1ebf4b89c116691acb242e7d13749257c228200016fc28ea21b6c9355f39