Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 19:42

General

  • Target

    1c44c18b98823fb90c30a4532d92aba0_JaffaCakes118.pdf

  • Size

    24KB

  • MD5

    1c44c18b98823fb90c30a4532d92aba0

  • SHA1

    e82411c191b646ec62ee5827d81434d096df4e0d

  • SHA256

    9ac6af43d9251e92cad3c89385c84d5c0f2c57254f4cec412917763d66e5e671

  • SHA512

    584c4e0ddffa350b6928438cfe31f875d4d3f5989a69e519ff3d603a80e815c5ab515d6d3d80b9abeb932fb822cfafac47dd4140b6563788dc04d448623ff6ae

  • SSDEEP

    96:WEDsNyvV0c645vFB+OlybcxMFizBQoGMFizBQo73KrOLJnVDceQj2KnSnZ1WjnYV:WysNAbl6ypyxYyTuJFnEp9bA49NP4X+

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1c44c18b98823fb90c30a4532d92aba0_JaffaCakes118.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1644

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1644-0-0x00000000034E0000-0x0000000003556000-memory.dmp

    Filesize

    472KB

  • memory/1644-3-0x0000000000C70000-0x0000000000C71000-memory.dmp

    Filesize

    4KB