Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 14:59
Behavioral task
behavioral1
Sample
d7a2427373f0bc1e3f1b8060df983d4d_JaffaCakes118.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d7a2427373f0bc1e3f1b8060df983d4d_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
d7a2427373f0bc1e3f1b8060df983d4d_JaffaCakes118.pdf
-
Size
75KB
-
MD5
d7a2427373f0bc1e3f1b8060df983d4d
-
SHA1
2846d12d437abfad83740ac6e9e5c8186b55794b
-
SHA256
b14e7e0e632112dceb0f8caa216086d1844642e68ddc2b11a79043939e6e724d
-
SHA512
192e02d1f914cce77851f7187544f1bc93d4ae0c500528a39ce94be9b10d8a84cfff4f0361d05c375128071b6144b5d3ebf3604aa456d5b52415541426014553
-
SSDEEP
1536:QATfHsaQsZGIammTwZtxAxlfIP1DJ6xacS6IWucBEJCeqsh:NkaQsQjwZtZP1DsoA+tJPqC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2224 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2224 AcroRd32.exe 2224 AcroRd32.exe 2224 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d7a2427373f0bc1e3f1b8060df983d4d_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b0f3406ee4240cbdead17558392f8ed0
SHA175f5c84a110e880d3feee7636010ce0aa4a9c897
SHA2560146e45cb15dd1ed4dce00a1976d41901f223258fc9935ae27d7580cf2d566a9
SHA512f368e08e06f15623cce1d1ee11edfc8a45f8c445be93e609bcdef191f939e161567ea15ce84b927448e4513fc8a2379215a0f6477fb7e16521d16086b73a0829