Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 03:53

General

  • Target

    a549b703deca6a7028a29defe38f4605_JaffaCakes118.pdf

  • Size

    16KB

  • MD5

    a549b703deca6a7028a29defe38f4605

  • SHA1

    12d830cbd72f46e20c9f8e36caebc440e431f417

  • SHA256

    b536b5df200b7b463d98b424a300d87030798f64b9d7fa8e46c435551c42a176

  • SHA512

    f7f44fb3ee0b4d46ab0655c81b6ac831423a80c856e1d392a005472128de98590ff6b690bb45ef3e310f2e4d08c9ed0e09a2a0b84b687757af9ec10c5f3569db

  • SSDEEP

    384:4ONyCeewIjJizFrISRmkx696gk/ikokxHxv:TEgLCtp

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a549b703deca6a7028a29defe38f4605_JaffaCakes118.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3044

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3044-0-0x0000000003E20000-0x0000000003E96000-memory.dmp

          Filesize

          472KB