Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/03/2025, 18:24
Behavioral task
behavioral1
Sample
JaffaCakes118_6c92576af66825cc6d7a9f78dec163f5.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6c92576af66825cc6d7a9f78dec163f5.pdf
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_6c92576af66825cc6d7a9f78dec163f5.pdf
-
Size
12KB
-
MD5
6c92576af66825cc6d7a9f78dec163f5
-
SHA1
b5c2c035cfe82b39f3030e947ff97103d1e0f9fd
-
SHA256
a00a78986a4668362b8734034fd44369b6ee6d408c99324c98c4616b30c28c31
-
SHA512
f7f901f034c8feb6a5d488586df2bdb7787443834de1accee42f2228218acac236196a4643f067b4fe78e497001a609bc0c853c7fbbf73e0e7898b0d6c2425d7
-
SSDEEP
384:YKz4ULMxLYJH+eKArOS3ZtSdK7+6/ZAw5j1OnF/aABeywMNV:Yu/usdKs13ZtS5oZ3hOnF/z11
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2368 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2368 AcroRd32.exe 2368 AcroRd32.exe 2368 AcroRd32.exe 2368 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6c92576af66825cc6d7a9f78dec163f5.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57b672f8f584364006fd871b411fb8387
SHA19766b8351efac94d11b354c8c1432c2ca86a5dbb
SHA2562e3319cdf0baad6fe41d7ab9899f5c8c53aa953e8649e183edf14b231b03dd56
SHA512fbb915ce5a97ced2b8b08190901813dd170444229fde4a7a93c18591d67033827c2b41b7c4cf49957f4984eef9f91143d2beab872cf580098b1516577769c6e1