Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 14:39
Behavioral task
behavioral1
Sample
d79039158bab9f8ecf2a5f125871183a_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d79039158bab9f8ecf2a5f125871183a_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
d79039158bab9f8ecf2a5f125871183a_JaffaCakes118.pdf
-
Size
88KB
-
MD5
d79039158bab9f8ecf2a5f125871183a
-
SHA1
64a042f425a05cc1843160a6c31ecab403b92199
-
SHA256
c70444cbc1b3a2a84670cd5f8795f3b9f25038ad897551c99beabadb91ece551
-
SHA512
11080af0c9a4b3e17723e40e28b8dedfd50496627a992a4841e53702edcb28d7dd0e7709ae12c4f1b46c55a4e8011d0c993af56eac8c0cdf00a520cdfc3580ce
-
SSDEEP
1536:dTPiPfr15Q18ShVbyew6Dl7+TSY7FyFatyPN6HFxKCG/z0egfiuMNOTWapOtQHWX:Zur1W8EAetMSCyl+FoCGIPfiXNO8tQLc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1648 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d79039158bab9f8ecf2a5f125871183a_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c4111c2d4ac986e005888a7447744325
SHA149789dc54680bf068986486e244e105adb15208f
SHA256277070793d193ce55730f182a5c3a06bdf31409370b4e9eded89008a8bd4ce6e
SHA512498eb22c921f478cd217af7fc4e8f4108cb96e133c2ad4290a77ea3a602044ddd9b0910aa870319b4b84166c3c4a6ad419891e405c4666f864c9596c04a5a8a3