Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 10:28

General

  • Target

    052691453838416b5c7542ac767135f0_JaffaCakes118.pdf

  • Size

    106KB

  • MD5

    052691453838416b5c7542ac767135f0

  • SHA1

    4f05dfe77d52bf621aea15bffd3a4372b046a150

  • SHA256

    4663107c4e01b56ba595eb3d3e3974e45a46d336066c21313ecb56362e9004d5

  • SHA512

    b833b548af61f9ae60d0cb682cf7a239861942e9792ed9b471fa6420a7e65a73752e0f5a138cef6786d9ea4196f44d8e022d9d29517e33d1bf4eb649b7f7bd89

  • SSDEEP

    384:bONbedw+lJ5m0uBrhqhxv3AQimj5hjskhhhNhvzhohuYhehthhhefhthrhzhlEFF:5

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\052691453838416b5c7542ac767135f0_JaffaCakes118.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3000

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3000-0-0x0000000001050000-0x00000000010C6000-memory.dmp

    Filesize

    472KB