Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 06:46
Behavioral task
behavioral1
Sample
JaffaCakes118_f9e3d333ccf43cc59db7732d4da468dc.pdf
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f9e3d333ccf43cc59db7732d4da468dc.pdf
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f9e3d333ccf43cc59db7732d4da468dc.pdf
-
Size
81KB
-
MD5
f9e3d333ccf43cc59db7732d4da468dc
-
SHA1
c125a541d5f5388f3b8b96aace16389d51e2b405
-
SHA256
86d83dd375f560762075e1e9cc5faacbc3f90e5561d2fa9ae6a202f63db2ea87
-
SHA512
d22cb0939173565df4ce9723b9e4f1bd11385ec34634347f95b4b06d941b049f820f1723b57b1f1f34a4dcedb51f82895de397b562c97c9366d225680bdb43f2
-
SSDEEP
1536:cJ0Q4DUJgqyzblQwA/YYryf39moS8V0zplzUuWapOtQHWQ64EgAIue19w8OERr0:SJg5viwHYGf39O8CVlzUztQv6xKuS9Ps
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2344 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2344 AcroRd32.exe 2344 AcroRd32.exe 2344 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f9e3d333ccf43cc59db7732d4da468dc.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b890529e65dbf0f27263ee5eaaf27598
SHA19a0ed6df557211c48057188436594b1aa432ebbd
SHA2568db5b2a7637a193566da2b510c22d7e05f1bbb7cc2ebd9fed1c2b67d6d083606
SHA5126f19d90c16f704e57ab6b42692113a95d8e95682a9cf82e7b5aa0b557423f34a90fffb38ec386aaab979a473bc4c6cefa124e61da8601f32a74923bb4e207cc1