Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 08:20

General

  • Target

    a60d528060ce6aa41bef2be0940dcfce_JaffaCakes118.pdf

  • Size

    9KB

  • MD5

    a60d528060ce6aa41bef2be0940dcfce

  • SHA1

    9c757eec25550123eca9320e8bd66fdbb98f64e6

  • SHA256

    57b0fb4e4e087d9a5b32d1a674fe7838e5eab99bd887fe28de8594b12bcb35f4

  • SHA512

    2ac7e5979f992a27b456f45373a4491a88916f77293eafbb49ee473f74ca8e1855a8c4dddd4ffe74eab382dcf9f1c0ee800e8efafd7b760528fed02303d14fa0

  • SSDEEP

    192:lPz4ULMxLIKXHsfyxjsz5oGA3Ry/yELjHcYdnE7AKC8IV2+e6PCykCl:lPz4ULMxLIKXHsfCjg/PLNyqxe6PCykE

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a60d528060ce6aa41bef2be0940dcfce_JaffaCakes118.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2236

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          f8c8ab26d58c2ed52547d8370c9ac133

          SHA1

          7047f7f934499dc26dea428d2d59c6bcfd9951b7

          SHA256

          c232022d75b18bc4b7e97329b53a4d5ea48358e45ae300e3dade5d176672ab41

          SHA512

          4fbf8b2e086e5874d815fa9c2397abf34fa428df7883b9b69340cb83a278f2d3971b9bba30a159ac84cf60d29d5524a919f5bd07fca79471001fe7367b3645c5

        • memory/2236-0-0x0000000001340000-0x00000000013B6000-memory.dmp

          Filesize

          472KB