Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 14:26
Behavioral task
behavioral1
Sample
d782bf89ed9666e9fc250227dd0cce8d_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d782bf89ed9666e9fc250227dd0cce8d_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
d782bf89ed9666e9fc250227dd0cce8d_JaffaCakes118.pdf
-
Size
84KB
-
MD5
d782bf89ed9666e9fc250227dd0cce8d
-
SHA1
205cfd9757aca9367d7559c7588de6a9d6185bbe
-
SHA256
e66cc2d8d779c3cb86b75eb6918422929cde7438fd09c6c8ff8413a17028e2a4
-
SHA512
35737536fa0502a374fa3ba6546cb5dedcacb8221fbfb3c70639f43b9d76dc77c5c7542768add7bdfb653fbbd432a68b9ddf1e09b4cd4f1756e556b356086be3
-
SSDEEP
1536:ACSR2Qe//bSJw29Z1AQoZ3O5FchwMRNbhSYyRnt+Tlqg7zUWo19tcEi:xf/+X294vMXbhSl0TN89t+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2228 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2228 AcroRd32.exe 2228 AcroRd32.exe 2228 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d782bf89ed9666e9fc250227dd0cce8d_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bcf84b5ed2ce09043c29a3df28c0fb06
SHA152aa9cadb44619000b4bbc5fc0de3ba2fa82ddef
SHA2565ba1be104a03b44b444914bd4e4b3ecaf05cec6e22f7d8ed4dd8445e6018188b
SHA5122c7bae44940d9e4623f326e43f5d214f410055b6af367b9da1b86b22c13aed84f7f6ea22e72a7c2dfb4f022a8aa51a52768594362c6fdcdee85b7e1f0d00da3a