Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 14:57
Behavioral task
behavioral1
Sample
d7a0471b3e461c5e293dd7965cb6db4e_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7a0471b3e461c5e293dd7965cb6db4e_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
d7a0471b3e461c5e293dd7965cb6db4e_JaffaCakes118.pdf
-
Size
81KB
-
MD5
d7a0471b3e461c5e293dd7965cb6db4e
-
SHA1
aea22b28b2c5cedaffd71082ac8cfe6b925490ac
-
SHA256
8ef4387748274ceabb8020e820a15fb8f6c0245f5c52a788658a7866f5a8ae5d
-
SHA512
60cd48b0b2b9b614e1b1fd617e7bcab1fd732ad4c1763b46a80f22527c82765be379f936bc1625b52e1710ad32564dba8f7b44f7530c702f17854db9114c93dc
-
SSDEEP
1536:dH7kbRdkdfIaSPAkQAOJ5Dhv+u/iFp94U+xfw1WuWapOtQHWWijWd7PwBv72qxo:4UP9A05opvfueWztQu6dav727
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1996 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1996 AcroRd32.exe 1996 AcroRd32.exe 1996 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d7a0471b3e461c5e293dd7965cb6db4e_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d903d6bd60e6031dc9b6846f022fbeca
SHA1c8c964cf39d3b8451ccd7d70cfe8afd4ee4e02ac
SHA256248f956ad78e37a31e1c4a260f650f502ddbe04f1995ec71bd90b250b84b0829
SHA512cf70284e215c1aa9484b122ee1e2c6a0ca0ee3a29a6aac03f8df35919b4de3c953ce584e6819c58e1db03e41261211eb5768ce27fd9d9b5e4ba9d35b0b1c6a32