Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/03/2025, 00:44
Behavioral task
behavioral1
Sample
JaffaCakes118_623f3d184f6290d81baceff8a4743c6f.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_623f3d184f6290d81baceff8a4743c6f.pdf
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_623f3d184f6290d81baceff8a4743c6f.pdf
-
Size
10KB
-
MD5
623f3d184f6290d81baceff8a4743c6f
-
SHA1
36f33601100034c3c609213256793f9f66640cd8
-
SHA256
2a17f58e31be3fb43b913b05aa5da40012d1e1603b4b6facc0661f4bca0bb918
-
SHA512
1c734a5d04a3ea9c82cd185d0dee8fb1d83d317f2fdcb203dcb0106363fa5439445bb8929a40f610d891753a284f7cc34c0e9d87df20d59d418b4f225702ff47
-
SSDEEP
192:6T74YQs6CQBh+dNmXNpk2RzZJT9Q+BDg19nDZXv6GAvxKIKe2Lzz:6AYQhCQBhi4u2Rz9QWDgznDVHp7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2248 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_623f3d184f6290d81baceff8a4743c6f.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b511a640efe12b5e1c254a8fe2236c92
SHA1bb818d60d7985ecd2788f447b1dc835d6d27abe0
SHA25688099b21215350375413b26c5be4e18f90ab492841e539b3cbfa5373b0795f89
SHA51216f0fc89bd30c7cbaa26185fe2149d7ef923f3c1ee1e2d41b57afc8622bc06e81a591c9f4ea25463bf35d31c8362a7b7506d48b822802fd49c0e65ed9c08e0ca