Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 04:57
Behavioral task
behavioral1
Sample
18dae5b39279a182e4d909e52d851c17_JaffaCakes118.pdf
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
18dae5b39279a182e4d909e52d851c17_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
18dae5b39279a182e4d909e52d851c17_JaffaCakes118.pdf
-
Size
70KB
-
MD5
18dae5b39279a182e4d909e52d851c17
-
SHA1
3f3313998b2599a13e5bb1367e22d57787b6d8f8
-
SHA256
d652c05ac0b73c588ebee1b5daaa35110027165d7b96731ca4740b554a8eb06a
-
SHA512
4dd45f587abae8604bb7c35aee0fb4cfdb26e3c371e161ad7cd9126ffdecdef6c34a53cebe1b539e9a28e4563a36d6276d1da1538df3a6f71b168deb39b524a4
-
SSDEEP
1536:ALSUWCywAGiFSsF+9YRJrFGGNdYRHaCr69quUOcFiBCQRX+wPl:mO/Qs+9ErMGNdinr6/xRBBX5l
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1948 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1948 AcroRd32.exe 1948 AcroRd32.exe 1948 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\18dae5b39279a182e4d909e52d851c17_JaffaCakes118.pdf"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1948
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c6ac5ba71676cae3c99d78acbbdfc404
SHA1fa4b81e96a41100033560b23911edb619a795cb0
SHA256f154b110b3dee6d1e820e5a20efa69e90c1234e60831a40d1f52f287800c5acf
SHA512daa9db220d1d0b10030010d3a11342dd18372faa5ca5f0ea24c019dd175bf73cd995020cf2145bdc6c8775bc8d3fa60ccc0a80da4a499746a8bc3e255d39df5e