Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    18-08-2024 21:56

General

  • Target

    a85ece64200d1545b5bcd5285146773d_JaffaCakes118.pdf

  • Size

    111KB

  • MD5

    a85ece64200d1545b5bcd5285146773d

  • SHA1

    5c3cbc25b9336d42d46c0940a8cbe95d8d53fe47

  • SHA256

    a8f1d8ea78dff56d40a7b905f0cd2a7f21b5758e794cf2b2762a26d7aeeaf060

  • SHA512

    2a9e7319d3c89159e48a117896435162ce5eb77b0cb82d8721b04812a0ee147aa71a4d4b3aa9d8ce6a945508108f9b0c801aeb9c6f557b454adb40042bddfce9

  • SSDEEP

    768:D/mWZSVsV1YPveYmYGbLB/vbQNK775BoQ4mijVJipEhiD6T+bIxp0sO9PGVigGZw:Y

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a85ece64200d1545b5bcd5285146773d_JaffaCakes118.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2432-1-0x00000000032C0000-0x0000000003336000-memory.dmp

    Filesize

    472KB

  • memory/2432-3-0x0000000000B50000-0x0000000000B51000-memory.dmp

    Filesize

    4KB