Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    15-07-2024 16:09

General

  • Target

    4a699c16f5815927bc14496f48ccde01_JaffaCakes118.pdf

  • Size

    24KB

  • MD5

    4a699c16f5815927bc14496f48ccde01

  • SHA1

    a9a1407b3bd3df084204b1176d79cb7ad4ea546b

  • SHA256

    681d5d4f9e68e244d1b2afb16e4e6ab26bd3eedcc7aba6195d505dea66ef1e7f

  • SHA512

    a5cd4ff163893e3c1cdac319824c7ca30def2804b4b299c26c271a7021c3e093791647502507ae7b85f55c5d9e8d2ddad5ba72be03419ee3400136b18532df71

  • SSDEEP

    96:WEDsNyvV0c645vFB+OlybcxMFizBQonMFizBQo43KrOLJnVDceQj2KnSnZ1WjnYF:WysNAbl6yayyYy6foMFt0A49NP4X+

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\4a699c16f5815927bc14496f48ccde01_JaffaCakes118.pdf"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1648

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1648-0-0x0000000003C10000-0x0000000003C86000-memory.dmp

    Filesize

    472KB

  • memory/1648-3-0x0000000000DD0000-0x0000000000DD1000-memory.dmp

    Filesize

    4KB