Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 06:47
Behavioral task
behavioral1
Sample
JaffaCakes118_f9f0e29fc94b990bfb0ba36b555d60f7.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_f9f0e29fc94b990bfb0ba36b555d60f7.pdf
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_f9f0e29fc94b990bfb0ba36b555d60f7.pdf
-
Size
72KB
-
MD5
f9f0e29fc94b990bfb0ba36b555d60f7
-
SHA1
fa73062760ea6e944c6af8d790fbb72d5a5b14ba
-
SHA256
6ae882707d2483e2c35a8f154077c2f78484eae13de3a846acc0f51fc535433f
-
SHA512
00197babfcd145872739e2540a43a71fcd1eb7d5584a9a21e24b5ac501259c8f607ec14ab5f8ee094e3b47a7645efa12d1c2966698286b24f6752ed909e0aab5
-
SSDEEP
1536:4bzLlDJnOCAjxiJCT1sf8AYujTmX4sJ9W10YLWQpOCoWDle13B:QJdOzjxiJCufIujTmX4sXI0Y2Cpej
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1672 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1672 AcroRd32.exe 1672 AcroRd32.exe 1672 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_f9f0e29fc94b990bfb0ba36b555d60f7.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5adb820e3a97d498caac6e98091e9e69a
SHA1f0a7cf84d805bdf6045be7eda9880ab86f414806
SHA2560aec6c98ee6c8c662e53f22f12a0dfd318b0478f421465401a050d170f82eeb9
SHA5120cfee0f4da86377c23a2c80f3cf23230f25ddf8625f3ef099f4ff0145a088ed490f33fd9eb639a5e2bbf3bf1c51af1cb86379e2192895a93eb5c7bad02ff8bd9