Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    24-08-2024 17:26

General

  • Target

    bf19b7683437b176400c25d9ebce0d49_JaffaCakes118.pdf

  • Size

    12KB

  • MD5

    bf19b7683437b176400c25d9ebce0d49

  • SHA1

    55cfb7854167027de085a6b96e1f2aace55ce26b

  • SHA256

    ee64b3545c47d17d92e49024b43075a51b0f80cc4282eb669cd64efbe101cb7b

  • SHA512

    358365080cb374538b31ca88ff80b5c35f6872c945360dd50f9947d3eddf954c2d612f297843f0a003cee53c7117b86ad5e2b785c989d8c905807b8f88e2c528

  • SSDEEP

    384:DLEMys5AL0O0UErx7olNPslxHK9Avh5CsIqy83RPFOF++:DgQIEYJ5

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bf19b7683437b176400c25d9ebce0d49_JaffaCakes118.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2232-0-0x00000000035E0000-0x0000000003656000-memory.dmp

    Filesize

    472KB

  • memory/2232-3-0x0000000000D00000-0x0000000000D01000-memory.dmp

    Filesize

    4KB