Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    15/07/2024, 02:40

General

  • Target

    47df0e51b7a4c7bcc249c903313015e1_JaffaCakes118.pdf

  • Size

    102KB

  • MD5

    47df0e51b7a4c7bcc249c903313015e1

  • SHA1

    7a26ea11918105e1e01a3f2d1392684687d34e80

  • SHA256

    3424a3e0baf1f6b4ca0262c5189e98ab464a2a1c67404dc7b9ca8ff95730a6cd

  • SHA512

    85e06f8fe99500ed1a0f4d4cb7b662dbf7586d8683499cb56cd6d6b2e556417ce3a123bac71957bc5fffb47417604a292c5f2849875dd950e6a14615f30c17ba

  • SSDEEP

    96:WEDsNyfV0aWJ5vFB+OurRD02XTV41P16XrpoR0LOo/XPILR6CBqtZZPmPDx+:WysN0AurRD02XROPSn/fAM9NP4F+

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\47df0e51b7a4c7bcc249c903313015e1_JaffaCakes118.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:484

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/484-0-0x0000000003E70000-0x0000000003EE6000-memory.dmp

          Filesize

          472KB

        • memory/484-3-0x00000000020F0000-0x00000000020F1000-memory.dmp

          Filesize

          4KB