Analysis

  • max time kernel
    24s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 05:52

General

  • Target

    893ca592854c1c4990fb7880c3f2cc09_JaffaCakes118.pdf

  • Size

    79KB

  • MD5

    893ca592854c1c4990fb7880c3f2cc09

  • SHA1

    17d42718aa31b3f8dcbb38c974a87b33005044c8

  • SHA256

    fada06f18516b4c871d5b95d9ec5d146a8cb49a9400464554aa848bdc5f7b47d

  • SHA512

    1ad6c17b73a7012c7043f86b9f70a6aff0e57224d5d68b712e97e5044866fb6cff3533da43da1ad15dd1badbc6abc4daf4f822e3ca70b1bea0cd682952fcb194

  • SSDEEP

    384:B3xFSDuFvp6nI6CsU64IR9kt8It6hx6jkgMATUAs67KCevlVvJ66G1z6qYLZW+vs:jH

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\893ca592854c1c4990fb7880c3f2cc09_JaffaCakes118.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1756-0-0x0000000002660000-0x00000000026D6000-memory.dmp

    Filesize

    472KB

  • memory/1756-3-0x0000000000C90000-0x0000000000C91000-memory.dmp

    Filesize

    4KB