Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 14:54
Behavioral task
behavioral1
Sample
d79db718a0a0f97ab9b08c8bc8549935_JaffaCakes118.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d79db718a0a0f97ab9b08c8bc8549935_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
d79db718a0a0f97ab9b08c8bc8549935_JaffaCakes118.pdf
-
Size
91KB
-
MD5
d79db718a0a0f97ab9b08c8bc8549935
-
SHA1
f3d38b9308e48e27be3a316fa8c7f3e2985af276
-
SHA256
fffe2e47389ca29a32af9ceb61c85da69f205b754753d48eb605d7bfc07e55d4
-
SHA512
52d8c924e7b18772fba6ed68970f78d761caccd503d493880805a35245c8e7752f129b841de6062e467012ea7b7e9a89aedc21822b979580fc42cedfe5f48f4e
-
SSDEEP
1536:wshzgqewZYjAQyksoXjo3DHeSoQmaNY9FGB9j6qqNt6o6srEWQpOCoWwcWXdCRyU:Xz0wijAQz3o7eSoQmC7PhqNtksrDCqNW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2640 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2640 AcroRd32.exe 2640 AcroRd32.exe 2640 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d79db718a0a0f97ab9b08c8bc8549935_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5db01079959c82687ac75cb5091fd03c8
SHA1f43abc40ff4839d5be202bad22c60032f11f5048
SHA256722dce08aefd0d71fea28622d40414f4a2cec728d33214657f4f38ab3c0421f6
SHA512e6870740f2c23544ab99a4f5775bd5220979493c99df9490558c059125544a72e6ded60cc4ab4f8a405cde98498b86b9f54ed9b9842f21f96a89e0c016eb00fe