Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 10:10

General

  • Target

    05663e87fd0c6c1dde6ad5064e3ed890_JaffaCakes118.pdf

  • Size

    3KB

  • MD5

    05663e87fd0c6c1dde6ad5064e3ed890

  • SHA1

    6ab02732531760860c91c0f81ed08ab4a6931753

  • SHA256

    be5a3df1029ca19267aea6ab73b5de0560022c59ca060d7e1c7c82cd1a880b2b

  • SHA512

    16a92a03eb5691930ce564048cc10b6c20a0a8bcf5074baaa1a471f356ce35358f2f96ec8b65f4a2537c6704a81aeaa9aabe8b2a1e47ee524be88e89b2401d3b

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\05663e87fd0c6c1dde6ad5064e3ed890_JaffaCakes118.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1484

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1484-0-0x0000000002CE0000-0x0000000002D56000-memory.dmp

          Filesize

          472KB