Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2024, 16:32
Behavioral task
behavioral1
Sample
bd25181bac6e8ac7c66c5544ae14ac3e_JaffaCakes118.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd25181bac6e8ac7c66c5544ae14ac3e_JaffaCakes118.pdf
Resource
win10v2004-20240226-en
General
-
Target
bd25181bac6e8ac7c66c5544ae14ac3e_JaffaCakes118.pdf
-
Size
90KB
-
MD5
bd25181bac6e8ac7c66c5544ae14ac3e
-
SHA1
d5dc96649aa7f98449db5b0a732dff92d61baea8
-
SHA256
98df17c3b3c5d8744fe7fc1a9bf8595dc25bd1b4f792b68fbab2d9e6eba74645
-
SHA512
d5cd1afc68e4b06035b46a1c14e08b3e0af167e3a9b860a312e8259044b1cabb3da8b5b200f2c44b9e521cee24823fdb234b5a6f57169ca49184fa32ced6f836
-
SSDEEP
1536:gSlyvmqjrmvwZYL26ale5/1G1G1pSTL3yDneberkXWypOlWWxyPc3x6X2RBl+Dhl:Z+pnO6eaAS1G1oTzyDnebertlDXxUu3y
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1216 AcroRd32.exe 1216 AcroRd32.exe 1216 AcroRd32.exe 1216 AcroRd32.exe 1216 AcroRd32.exe 1216 AcroRd32.exe 1216 AcroRd32.exe 1216 AcroRd32.exe 1216 AcroRd32.exe 1216 AcroRd32.exe 1216 AcroRd32.exe 1216 AcroRd32.exe 1216 AcroRd32.exe 1216 AcroRd32.exe 1216 AcroRd32.exe 1216 AcroRd32.exe 1216 AcroRd32.exe 1216 AcroRd32.exe 1216 AcroRd32.exe 1216 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1216 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1216 AcroRd32.exe 1216 AcroRd32.exe 1216 AcroRd32.exe 1216 AcroRd32.exe 1216 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1216 wrote to memory of 4768 1216 AcroRd32.exe 99 PID 1216 wrote to memory of 4768 1216 AcroRd32.exe 99 PID 1216 wrote to memory of 4768 1216 AcroRd32.exe 99 PID 1216 wrote to memory of 4616 1216 AcroRd32.exe 101 PID 1216 wrote to memory of 4616 1216 AcroRd32.exe 101 PID 1216 wrote to memory of 4616 1216 AcroRd32.exe 101 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 4372 4768 RdrCEF.exe 102 PID 4768 wrote to memory of 1184 4768 RdrCEF.exe 103 PID 4768 wrote to memory of 1184 4768 RdrCEF.exe 103 PID 4768 wrote to memory of 1184 4768 RdrCEF.exe 103 PID 4768 wrote to memory of 1184 4768 RdrCEF.exe 103 PID 4768 wrote to memory of 1184 4768 RdrCEF.exe 103 PID 4768 wrote to memory of 1184 4768 RdrCEF.exe 103 PID 4768 wrote to memory of 1184 4768 RdrCEF.exe 103 PID 4768 wrote to memory of 1184 4768 RdrCEF.exe 103 PID 4768 wrote to memory of 1184 4768 RdrCEF.exe 103 PID 4768 wrote to memory of 1184 4768 RdrCEF.exe 103 PID 4768 wrote to memory of 1184 4768 RdrCEF.exe 103 PID 4768 wrote to memory of 1184 4768 RdrCEF.exe 103 PID 4768 wrote to memory of 1184 4768 RdrCEF.exe 103 PID 4768 wrote to memory of 1184 4768 RdrCEF.exe 103 PID 4768 wrote to memory of 1184 4768 RdrCEF.exe 103
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\bd25181bac6e8ac7c66c5544ae14ac3e_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=CE417636E1EF7ACA874911DEEC472BDC --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=CE417636E1EF7ACA874911DEEC472BDC --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:13⤵PID:4372
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=EA79A026D4757A4603C51021B8BB0722 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1184
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=618DB38BD512B739C6F39B8FF68C9812 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=618DB38BD512B739C6F39B8FF68C9812 --renderer-client-id=4 --mojo-platform-channel-handle=2168 --allow-no-sandbox-job /prefetch:13⤵PID:2756
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F8CB5D717D06D24F8478622D80E98923 --mojo-platform-channel-handle=2556 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:852
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A6D7258605658280CA29C2D87008FD84 --mojo-platform-channel-handle=2084 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1136
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2AA07D77E9BD6F801041A9EA99DCE68A --mojo-platform-channel-handle=2076 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2188
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:4616
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1364
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4328 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵PID:864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD53b9eb15a99ab43e3a7eb44f4f6e9be69
SHA1a423182cc09d531224724002b710150317037ec6
SHA2562a09ba375a9af3614133367496c9b702997af7ca2432ccb935f7ab66055014cb
SHA51225d4d3bd157a67ce9d7b9ffb747cdfb4288f9340ff2e042b002c46b75c240cc55cb12180c470733572b0bf781a9a9bcfe804d4e924bc59cc3a16ac1bdb1624ce
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
Filesize
12KB
MD5d04116f8076209bbe3b49f85e89d57dc
SHA1b9dc043e5d41e2b60406848c7a98d4b8e8b4f9d4
SHA25696b923f9b63153d450ceda30fded79a9cda83204c862c34b294811f44cc87f2d
SHA512301bf13b17d362d945fe168bde70018f8910e510114e98d34a6c6c1bcf5e0c75838d8fb260b25fe81bf24f8c38f7d1bb046c9a284d475da90159b7bcbc928754