Analysis

  • max time kernel
    22s
  • max time network
    32s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 15:56

General

  • Target

    c9239c976ac1f489cef420babd8002a5_JaffaCakes118.pdf

  • Size

    14KB

  • MD5

    c9239c976ac1f489cef420babd8002a5

  • SHA1

    b17375dc0af3e8ba308af32f5b2ed2afce95727a

  • SHA256

    b2dbbb5cbfb386530dbe5b4fcd91741f156f73f8d9f0bb2baa4be97e8b209356

  • SHA512

    8fce5abafac2e573765f79a71c440ff9f77e93d4393b7489c9b5a73c46a4dc447a6e01058ec116849cc35807be9798c975c5c607d8734edef8174dc0bfe4c3fb

  • SSDEEP

    384:WysNUUntKsHZ9StB+btKsHZ9StBYVFxIi/LrBciRZCclyM9NP4F+:WlyE

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\c9239c976ac1f489cef420babd8002a5_JaffaCakes118.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1368-0-0x0000000003200000-0x0000000003276000-memory.dmp

    Filesize

    472KB

  • memory/1368-3-0x00000000025B0000-0x00000000025B1000-memory.dmp

    Filesize

    4KB