Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 08:05

General

  • Target

    a1c5e7c8009bf9c1e1ad87da13890270_JaffaCakes118.pdf

  • Size

    15KB

  • MD5

    a1c5e7c8009bf9c1e1ad87da13890270

  • SHA1

    594f38ca05458bd352f5fdda1432c1fc0e2b2075

  • SHA256

    8a06681b888882e35e68604da635bfb8567e13c380a45d1d19b7b3d7c63ef9d8

  • SHA512

    a8d259e56f251d9116d724ab4588d5c40d32bc7c2122384c44cc46339ff7c4512a3f99f983edb855cb5abd304eeb0285352dfcd3f87df458a233e13a959b5fd1

  • SSDEEP

    384:4ONyCeewIjJizj8VG4MR/ONu2oAZFZkUFOCdcQupzXgaCxv:fGGp

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a1c5e7c8009bf9c1e1ad87da13890270_JaffaCakes118.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2228-0-0x0000000003CD0000-0x0000000003D46000-memory.dmp

    Filesize

    472KB