Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
14/03/2025, 20:00
Behavioral task
behavioral1
Sample
JaffaCakes118_7561d497e3db95c0f1a4bf2e8ef00d7f.pdf
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7561d497e3db95c0f1a4bf2e8ef00d7f.pdf
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_7561d497e3db95c0f1a4bf2e8ef00d7f.pdf
-
Size
4KB
-
MD5
7561d497e3db95c0f1a4bf2e8ef00d7f
-
SHA1
a44c38cee848e576c7ac4b051a25db3a752939a9
-
SHA256
100eabf5bab4eb071607f127bb87137dd40b45b523896f5a8693b49c5ad6cfb7
-
SHA512
5d8aaee9b8cb0a2d29ff42b99c67a487ac4c4adf2864b2ac5bda90433bbc2ce0d08cc515bf1abff86a7d2fe60ff1a490d7ca3a53e986aeb3943945f6bf6dedb7
-
SSDEEP
96:6PHWgObjgiqfUJfbnmUiS3StkPa+BVQsDLJUQv/Iy:6P2gY/O/5SLi8VVUWwy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2264 AcroRd32.exe 2264 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7561d497e3db95c0f1a4bf2e8ef00d7f.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2264