Analysis

  • max time kernel
    24s
  • max time network
    38s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 20:33

General

  • Target

    94a05b9ae9142c33bf66820b2cca3db8_JaffaCakes118.pdf

  • Size

    111KB

  • MD5

    94a05b9ae9142c33bf66820b2cca3db8

  • SHA1

    1db3d476fff9a32fd4e8811e36af12d6bdbd3a7c

  • SHA256

    5020a6c9cb119faf19bfd699ab9e60d3ee3866cae5908e06301bac83c6c221b6

  • SHA512

    68e3dbb3bcb90b581993e605ffb189c8a2a55240af508863fc421d80e7124bb115ab9f68eaf27fdce805930fc6ccb43d1948a9e8dacd5d0cac5b8eecf199de29

  • SSDEEP

    768:DJ2WZSVsV1YPveYmYGbLB/vbQNK775BoQ4mijVJipEhiD6T+bIxp0sO9PGVigGZw:y

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\94a05b9ae9142c33bf66820b2cca3db8_JaffaCakes118.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2948-0-0x0000000003C40000-0x0000000003CB6000-memory.dmp

    Filesize

    472KB

  • memory/2948-3-0x0000000000E00000-0x0000000000E01000-memory.dmp

    Filesize

    4KB