Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 22:19

General

  • Target

    3c5208cfae2486456b2d3e7a811fd28e_JaffaCakes118.pdf

  • Size

    13KB

  • MD5

    3c5208cfae2486456b2d3e7a811fd28e

  • SHA1

    d5d149d8ece99805216149bedcf797b9aa51b270

  • SHA256

    974379cf9442cb9b4bd90ee64e1ce7c7fbd2fc207033edb20ee7e87e8a1e9a17

  • SHA512

    3a1ee1a296075472f91ec39ed8f10f5211045e33308c592404a0b2cab0d5de22085173c7ab3b078b840f194188b0bda75b2ce03dd6b261bbb438004a40f82305

  • SSDEEP

    192:rQhzajYqwAO9G+/vvTs7hXbfym4GJVbBftJy/suiXGvQNi/60un/T8qvROdjzwu:shzaNwAO9GiM5fdtttEQi/60G78s4djN

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3c5208cfae2486456b2d3e7a811fd28e_JaffaCakes118.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:3048

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3048-0-0x0000000002690000-0x0000000002706000-memory.dmp

          Filesize

          472KB

        • memory/3048-3-0x0000000002440000-0x0000000002441000-memory.dmp

          Filesize

          4KB