Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 06:46
Behavioral task
behavioral1
Sample
JaffaCakes118_f9eb70d5b1afa9cc51e35890fc0c70ab.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f9eb70d5b1afa9cc51e35890fc0c70ab.pdf
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f9eb70d5b1afa9cc51e35890fc0c70ab.pdf
-
Size
73KB
-
MD5
f9eb70d5b1afa9cc51e35890fc0c70ab
-
SHA1
76b81fd4ff3d8d8e94eeeafdd22bbb990a39fdc9
-
SHA256
e2da204da038d0c0fe5593cc11ec94129e72e28824c99c7795f77e1dd0da9763
-
SHA512
7aa7eaefab800948e86764045e2c1d7676a36ef6dacb78c36b5a002a7850ef69fdf9c5c49b8dbdf2288ba918d485273200ef5844927ab17fb0ae1c136f5ebfb6
-
SSDEEP
1536:VM9WwjfFCg4WitP34dqUXqt8/Rzu1pbWYpO2IRIbYo7WMBJrFPmQsP:WnfFCgAR4dN//Rz6A2IR8YojBJhPAP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2772 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2772 AcroRd32.exe 2772 AcroRd32.exe 2772 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f9eb70d5b1afa9cc51e35890fc0c70ab.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d61eb15e78ab4631c3227fbc7626d0f2
SHA17f38cdbf075892bddd9fef6da5ea6fd4fb47a6ec
SHA2560f00433ddf87ceba05f4597ae7ed2455819b26a3d068fd2f934de42e119fd5eb
SHA512cd4744dc7f204a7b6ed21aeb669b224fc563bc5ee17f721eb168f415d7c7d87e8e78a03ab87407ccc1c47eff66adf40ba6a3db33319cbe179897f5d832b17542