Analysis
-
max time kernel
95s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16/03/2025, 17:51
Behavioral task
behavioral1
Sample
JaffaCakes118_7b2e4edc92621705bd63fcd60dde8c4e.pdf
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7b2e4edc92621705bd63fcd60dde8c4e.pdf
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_7b2e4edc92621705bd63fcd60dde8c4e.pdf
-
Size
6KB
-
MD5
7b2e4edc92621705bd63fcd60dde8c4e
-
SHA1
71baf87b2e9e1548e9036533bd12d1c513dd8b17
-
SHA256
bef5ca7adf615d3ade60c9fa882e5c6a0cf99b59699247e8827e40fc9009a733
-
SHA512
1b6092a71881ff342a9e0eaa98a0a38731bddce3def3ecf881e74b8481ad6f67c77badd20a6475fd69e494def5a71340e6d1c04696c503c21ec81f3f6911e935
-
SSDEEP
96:YGnjLNEsPHjoW5Dhnim0i5bgZsXxQ1WiJwmHtYSHkrsKk/tOptsYPKDydjM:znjzPDoutn3lgeBQ1Wi3mskrsSRZI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 432 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 432 AcroRd32.exe 432 AcroRd32.exe 432 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b2e4edc92621705bd63fcd60dde8c4e.pdf"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD553cb46cecc04e91bf150ae3ef29afb97
SHA1e8daf2ff89d9284eefed7789c76b38333816fd3e
SHA256d2c03c84edc9f5ebcf9eb42c54d0a9112e0fe6a05f2a1a12298ce4fe335cb587
SHA512b40cc1917c46260b9aeca280aa6f959737672f081e204792bb44421b0dfae5930acb0d3593aeffd7e0123eeadaf1da165d6224aedc880537f1ca38b7dc46bd76