Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 06:48
Behavioral task
behavioral1
Sample
JaffaCakes118_f9f8afc93c3d06d1a3d6231d26c0d722.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f9f8afc93c3d06d1a3d6231d26c0d722.pdf
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f9f8afc93c3d06d1a3d6231d26c0d722.pdf
-
Size
83KB
-
MD5
f9f8afc93c3d06d1a3d6231d26c0d722
-
SHA1
181b6c6539ceaa9de449a14c18348cc2f0da13bd
-
SHA256
ccd42301a26a473f781e913c85bee2cb0d15532016dffc318a053e6a79255166
-
SHA512
ec8ca5032bdf31ab7448f755dbb413e49663ef0083a313c5f748378224b40113c783f9dfa2849541232f7e34fb857170411993a8ca7f5d0223fdea1d5896a8a3
-
SSDEEP
1536:aOFLiaYfMFGZWjnrcSYURdLF1i+ITW7GHE4hc5v+w97svgWcpOmT+W+:zOMkZWjrcSYURhF1i+IeGHE6Uvz0Lmm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2260 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2260 AcroRd32.exe 2260 AcroRd32.exe 2260 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f9f8afc93c3d06d1a3d6231d26c0d722.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5124ab7939d396947828b82c33364143f
SHA1e293de398807ed0bc931423928e7fc389a517340
SHA2565c5fbb02b1c447f7e333e8db3ac23f5043069dd6c2ebaa32ceb9e3e995bc3c5d
SHA512633a1596f2e7d0a7b5823939d54fe099859a5cc8c104b3166896508aa0a1519b5a43d372550b199a2c903200076a5ede800608c13116319157dc30db5dbe9651