Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 07:05

General

  • Target

    c034804032f1e61b82ee8ceea2238b73_JaffaCakes118.pdf

  • Size

    8KB

  • MD5

    c034804032f1e61b82ee8ceea2238b73

  • SHA1

    c35cd7842e3c1df6976a98e02d3359a6083a3fd3

  • SHA256

    e1c46b46bc149a8f426453ec25991e1d616a3db7390a273bc404e01310765541

  • SHA512

    cf95b4c64f8b6054a7b95913cc49f4b6aef38f87a13f1295f716233c3e7a5dc50b7d24f6a40f87ee016e0c6c5adfa8e55d42280aa6345dffc3adfeeab89a2b7e

  • SSDEEP

    192:zP5uFm4k1W+VI5d+d5TGzk98zLstGJORnCPJCu5D8txlV9YV:zP5uFm4ku5dO6z30tcCu5otxlLYV

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\c034804032f1e61b82ee8ceea2238b73_JaffaCakes118.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    66a1f2c215776873332269330ec21609

    SHA1

    13e5c77ff0731cf964f20fb403cb1ba38e421624

    SHA256

    21357b8fbc70d680cc59cfe736a7a9a2590eabe880f10db436b9bc9fe7cd0091

    SHA512

    97b8b66c7f8666ee30c9880057cfdc53b21bf8821fd02ffbdd45b5f89e95ab3ad4ad0c2f139207888e875a28624a27a8893ef840fbad99bd0dbc0cac32bdadb1

  • memory/2540-0-0x0000000002FF0000-0x0000000003066000-memory.dmp

    Filesize

    472KB