Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 17:18

General

  • Target

    f047aa50d9ba22915b83fb8222e8814d_JaffaCakes118.pdf

  • Size

    73KB

  • MD5

    f047aa50d9ba22915b83fb8222e8814d

  • SHA1

    a4caf8dffcdb8b2c89c5eb6384af1bf859b34f3c

  • SHA256

    fd88f18d24c2d340f06f068a3ef7760eff0e7b2a655985f32190587a8ca60694

  • SHA512

    37daaf68d86e3cfb7587e529eca7f695fcc7477e325c5fab6d452297de263e8f52df4e67af930ad6940719f196442221abefceca2d1703f820fc056af7acad63

  • SSDEEP

    1536:ynT1PW8KiXdCqhPSJo46iu/82iP5o7gC9cOOXH/FZcWH7yKUjJqhNLNNrAUzWQpm:uPhKiXvPSJo9/JiPa7gC9cOoH/FtFkqK

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\f047aa50d9ba22915b83fb8222e8814d_JaffaCakes118.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    7bd7dde5ab252f44122cb3ddadd6ce9b

    SHA1

    bceade10174d1f7efa8de9acd75158a8842eeeb1

    SHA256

    1ab91eb6aecae86cf42c58baf9a260a3f7ff4695097bd1bf5ecad731c1d1549f

    SHA512

    986693d4c9b961605faa99a218a921c2713df81c47fec885d1a20916ca1341aa4ed48caf4643b777292cea2d0746a7a1658e1342c1dda44a2ff29d6475645863