Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-12-2024 15:06
Behavioral task
behavioral1
Sample
d7aaa7c620ec044d7d1c4d4febcb2b93_JaffaCakes118.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7aaa7c620ec044d7d1c4d4febcb2b93_JaffaCakes118.pdf
Resource
win10v2004-20241007-en
General
-
Target
d7aaa7c620ec044d7d1c4d4febcb2b93_JaffaCakes118.pdf
-
Size
77KB
-
MD5
d7aaa7c620ec044d7d1c4d4febcb2b93
-
SHA1
cfbed03521788e297ae49d6b2bae5121f10e833e
-
SHA256
de080d72aefd238c0b69d8d2b5459a3071562c51192c24961d5a39c2bc834c0b
-
SHA512
87801f10e66e69b2632993ac6ff32872b8aeddd8eb2105c2539f0c17edf2c13d18cc389d22892df375cba26a349c4b472bd802dbf76cd6ba4504bf9d1df9a4a3
-
SSDEEP
1536:KjVF6Lr2ZNU27IqXuHMtVLn9q2mhwSZHO6yk8RMuMpMllOVn4DpGTJ:eVoLe/q0Vb9DmhwSU6ykKpMpMllOV4DU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2396 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\d7aaa7c620ec044d7d1c4d4febcb2b93_JaffaCakes118.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD527b695a6546a761b2d164f60da07e19c
SHA1f1f41b6124b9554e2aa39ddab044d880cfed8b13
SHA256b77c5e4dcfaf627e80c9264ada752281108d6eafaa559660e7bcec3cf5b896c3
SHA51255776da17926cfd9f2a41ca5b83bc1e314a249ab11808853259bedfe0af0672b9e33b830c2b307196b7ee8ec4f8413bf9cea62b5a996788c67d9ec23641e09a5