Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2024 02:03

General

  • Target

    91f28768e20c0fd901ebd50ad8ff855e_JaffaCakes118.pdf

  • Size

    42KB

  • MD5

    91f28768e20c0fd901ebd50ad8ff855e

  • SHA1

    dd58fe09a3370389b02f654a8ccd894faf91a834

  • SHA256

    c473df24517642478c0c445c66e81389f0b58e304f3208b63ed9d49927e57100

  • SHA512

    e060e121a9ed339fea07bee815674072af96150d5b84e36916f23d1f2a3be556f4b2a5aa3570a503c38c22b42e0e291d83dcd3e35d5b9d2690671b7861badf9d

  • SSDEEP

    768:mWMP/IZTiEgBMpkZPHNH5anItO5n9xkxK9RNL70yTnv:feeiEUxjtOJ9xSK9RhLTv

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\91f28768e20c0fd901ebd50ad8ff855e_JaffaCakes118.pdf"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:1840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1840-0-0x0000000002FC0000-0x0000000003036000-memory.dmp

    Filesize

    472KB