Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-10-2024 20:01

General

  • Target

    073724356f97bfb22f43c3ba3f874ed1_JaffaCakes118.pdf

  • Size

    72KB

  • MD5

    073724356f97bfb22f43c3ba3f874ed1

  • SHA1

    455fdaab5a7b4f2f6dc0a68f584da6a5036853e3

  • SHA256

    1616da8e5bb821866c5f0874a9bcd0b433840c00a774313ee10af53dbfbd4996

  • SHA512

    12319dad3366ab8a2de87b18e2e9249f076bd1e918ebf889e56a0452f951c2e9033d415ae1ffb464078d25ec964c377382e5e657d09b16a8e9a99d6bac2e0eae

  • SSDEEP

    1536:IovbcP0h6XczBkUi59MxX2X4a5q89mLncWkNpOP2mUU0PkWlvmJu4sbSs:FbTKc6O30B9mLnRPMLPZvmJupZ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\073724356f97bfb22f43c3ba3f874ed1_JaffaCakes118.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    fa29a0e0b02b167a16ad933ae7becb9a

    SHA1

    0a722805d7416ba726045ece43dd84f1cf06b1a5

    SHA256

    c6fe4efb3215d6472c27f43721619a9ff2e4a1c4d298f10ea7de5e54f8a79d53

    SHA512

    21fbb86b0ea610a0c8013bb867ef78e8cbe9003ba60156a71922be153c02de512df26fa4c0af2b5e19d378b1562a6c5f4474f82eea0227c610e17377f3c7a6a3