Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/03/2025, 18:55
Behavioral task
behavioral1
Sample
JaffaCakes118_66c63fcdd91ec9da02cda25d9f686f42.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_66c63fcdd91ec9da02cda25d9f686f42.pdf
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_66c63fcdd91ec9da02cda25d9f686f42.pdf
-
Size
453KB
-
MD5
66c63fcdd91ec9da02cda25d9f686f42
-
SHA1
27bffa9c0230ba42a254c096b2c6b08f422e3a48
-
SHA256
1b640a6a7bd82e28314bd0e4a87360f2cefebd39262d212679911784b0aac4b2
-
SHA512
6e567885f8b7c89de0b381275bfe9b161c098e108c846ccfef17d7f4032b9d0c9a71fa62543910dca2bb01b680b72bdf7cdde54f1c8d6a2e2a4594a7a3e4f5da
-
SSDEEP
12288:B6xI6h4IsDfQCmlwuUzAdKIEkb7H05870ji:B6x5yZUKSvHm8Y+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3008 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_66c63fcdd91ec9da02cda25d9f686f42.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD54618312ec50b52c81043bb6ff393cfc3
SHA180537497d939529b34de993b14d96510068bf075
SHA256e8e27396e2a043abd283eed4fd5b8fa256cc22e741defd522158fc9e29205839
SHA512fc589a974f35ee83c297784c7d7cc62826854422ceec2d5ff46aa6575f5b2bade27d26c1dfc0686602c81e5c14f75f7abd23e6c19fd90a2dbe70e0f5c09251e9
-
Filesize
3KB
MD5eff6241552b2082cef228ca4b59d622f
SHA1a163d3011257102b882d81ffe62b2ea53c725c02
SHA256a4088c6094b3d793a13c7a8c5b23d2ea9f76c734083389bb2f65a6b13e897872
SHA51267019b76bae9d3ee382a74b045f0f6716cd2e74b7907e95f61dd20e1f4cc062c9328a5126346c38ad7a2227227500aeafab4d798c5fd8a32bbc7253b5aaea12f
-
Filesize
3KB
MD5928807ae230edb95cce57a0b432351af
SHA150b5b84cd3b925b938ab20f703e37edcfc0bcfaa
SHA256ef1e05b6df9c6c2e692065cc781d6a1109f6e8c34b247e1f5e001318002b89a4
SHA512027824a7fac102127889374924b8b2a89717c18f97170b5938491190b40d51f1028872e303db0d45861a72fec20eb1520dfb4fc26c2e9c9b723b3afe7611f7c2