Analysis

  • max time kernel
    121s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2024, 07:33

General

  • Target

    6ac071e7e056a69defadf0b7b76aa7be_JaffaCakes118.pdf

  • Size

    16KB

  • MD5

    6ac071e7e056a69defadf0b7b76aa7be

  • SHA1

    3f8de2c7b48172ffc790af20f5badcf51e0eb28c

  • SHA256

    e7846db42bf6da6407f7ab4684f2e1bfbaf93279fb02f841de3ca91b74da95a2

  • SHA512

    fbc086c6fb6dc7529de273394f465f21df3d5b70cfb542b549d402149f7c3e4c4748a12ffbcb187bcc2b068adafdef5e2ebfc11cf8f12fde550ccaab38504943

  • SSDEEP

    384:WP5uqkucWvhu6Igg8qSFLab1Hotp1uTy4OO7NorAE+maT2NtpUlC+UF2D1NuYH:dWexkR+dY1vULr8IlC+n1NR

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\6ac071e7e056a69defadf0b7b76aa7be_JaffaCakes118.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    327080ff932e5f00313f8b31388e0225

    SHA1

    3bdc13ee101d3f41e1e6b63b09ae544b2043d074

    SHA256

    1b8a1a822ae3f502bfd51296027de5eecb679b89c03c39d75f0ede2417a7a4f9

    SHA512

    dfcdb93a1707448d237466abac3ced8c01208e581194da95550badaf6b348fc60fee80146de02bfa7f7fc59950fe2095c31818d9d590daac34303c65e2a48755

  • memory/2320-0-0x0000000003A90000-0x0000000003B06000-memory.dmp

    Filesize

    472KB