Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 09:10

General

  • Target

    2bc51bd4f101c6980276ca8626fe783b_JaffaCakes118.pdf

  • Size

    106KB

  • MD5

    2bc51bd4f101c6980276ca8626fe783b

  • SHA1

    8c79e7a91766f1ec30866154691774c181c180e1

  • SHA256

    304bed34c102c35c02055ac2f92e167a8265f4565d9ede6e6fac4a92b0b38d6d

  • SHA512

    def94dae00ea0d1599c5398308e0c6d8414bf68dd3f54a93c586bea36e1554a8ef378055f82c0f2e9608bd2843fd0fb0661d7b2fd099fe9b4369b9e86568e185

  • SSDEEP

    384:bONbedw+lJ5yFQFOcsf3EwraleT7/sfGfFJFCWmf4o1hhhhhhhhhhhhhhhhhEFJr:e

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2bc51bd4f101c6980276ca8626fe783b_JaffaCakes118.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2316

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2316-0-0x0000000003FB0000-0x0000000004026000-memory.dmp

    Filesize

    472KB