Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/05/2024, 15:56
Behavioral task
behavioral1
Sample
4042a687a9523c2911b5fcc6c7d5ff5c_JaffaCakes118.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4042a687a9523c2911b5fcc6c7d5ff5c_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
4042a687a9523c2911b5fcc6c7d5ff5c_JaffaCakes118.pdf
-
Size
61KB
-
MD5
4042a687a9523c2911b5fcc6c7d5ff5c
-
SHA1
21db310d5b23301f2e94e9e670c0d7f4d79e6df0
-
SHA256
a027bc401c20b7b290b677ee4bd33d0eac72750d99d1a10ca5613e4c26678640
-
SHA512
f7de4c88e22343afe2c4073993bfdc44c38c2e67e8b8018b71211b88106205c66ef94e7a9ba75179ba61438ac660e97e697445a4a79984aa6f51b203b0bc9a21
-
SSDEEP
1536:RGFYe8IcpTrBWV484Vi1RGW8c94wTsls1:0FYe8IcpHIV34VeRCc94csU
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1940 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\4042a687a9523c2911b5fcc6c7d5ff5c_JaffaCakes118.pdf"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1940
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57b7e8ff7f211de65d3cbe44cbbfb85da
SHA1b48f8ae1a9524b9feaed1854a944ef74f7b7b6d1
SHA256ae775926b1b1df6784c5c1a8251e936cfe3734696448b36e8c644ba08b9dedab
SHA512f6fcebeb7955a42e3a2ea94c443691a88218fba232159aa61ae0bc0c1e0a27ae0912a6d2f50cb047acccaabaad7893f54404e664e2c0dd0a187b408b183b5c1a