Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2024, 14:35
Behavioral task
behavioral1
Sample
e2c08710447b95abdbdb1930cfaf6061_JaffaCakes118.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e2c08710447b95abdbdb1930cfaf6061_JaffaCakes118.pdf
Resource
win10v2004-20240226-en
General
-
Target
e2c08710447b95abdbdb1930cfaf6061_JaffaCakes118.pdf
-
Size
76KB
-
MD5
e2c08710447b95abdbdb1930cfaf6061
-
SHA1
67e6f8fc2677e2838825ac5a6aed7ba0eee66bb7
-
SHA256
712879c4a4562a00e2c49815dea9a8e5a1b444f38442234becb57cb9c166e2bc
-
SHA512
bac27dc508540de79831e0a03d905704e31b02803f1ab1ffc839fe71cef7f5ffe42ac8ebbde30c508a8ebd328bb602fd7d9a20b4d784365c4719b97afe6a630d
-
SSDEEP
1536:ClqKlYgZPhvCZT7XJJ/t4i0nzdrk1cReF5/LVr:kdqtNzt4i0BQ1coFpLVr
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1280 AcroRd32.exe 1280 AcroRd32.exe 1280 AcroRd32.exe 1280 AcroRd32.exe 1280 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1280 wrote to memory of 4716 1280 AcroRd32.exe 90 PID 1280 wrote to memory of 4716 1280 AcroRd32.exe 90 PID 1280 wrote to memory of 4716 1280 AcroRd32.exe 90 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 2572 4716 RdrCEF.exe 93 PID 4716 wrote to memory of 4600 4716 RdrCEF.exe 94 PID 4716 wrote to memory of 4600 4716 RdrCEF.exe 94 PID 4716 wrote to memory of 4600 4716 RdrCEF.exe 94 PID 4716 wrote to memory of 4600 4716 RdrCEF.exe 94 PID 4716 wrote to memory of 4600 4716 RdrCEF.exe 94 PID 4716 wrote to memory of 4600 4716 RdrCEF.exe 94 PID 4716 wrote to memory of 4600 4716 RdrCEF.exe 94 PID 4716 wrote to memory of 4600 4716 RdrCEF.exe 94 PID 4716 wrote to memory of 4600 4716 RdrCEF.exe 94 PID 4716 wrote to memory of 4600 4716 RdrCEF.exe 94 PID 4716 wrote to memory of 4600 4716 RdrCEF.exe 94 PID 4716 wrote to memory of 4600 4716 RdrCEF.exe 94 PID 4716 wrote to memory of 4600 4716 RdrCEF.exe 94 PID 4716 wrote to memory of 4600 4716 RdrCEF.exe 94 PID 4716 wrote to memory of 4600 4716 RdrCEF.exe 94 PID 4716 wrote to memory of 4600 4716 RdrCEF.exe 94 PID 4716 wrote to memory of 4600 4716 RdrCEF.exe 94 PID 4716 wrote to memory of 4600 4716 RdrCEF.exe 94 PID 4716 wrote to memory of 4600 4716 RdrCEF.exe 94 PID 4716 wrote to memory of 4600 4716 RdrCEF.exe 94
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\e2c08710447b95abdbdb1930cfaf6061_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9BE5A25D9B4BC6A41EA241FE34132ECB --mojo-platform-channel-handle=1728 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2572
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=3F0BC9A5DA7150C56F6DAAF15D7CCA7A --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=3F0BC9A5DA7150C56F6DAAF15D7CCA7A --renderer-client-id=2 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job /prefetch:13⤵PID:4600
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=56003C1E25CAD32C4BAE7BC512F388CD --mojo-platform-channel-handle=2284 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1724
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=25872227026BE94090BEC73D97E7FCE5 --mojo-platform-channel-handle=1852 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4960
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F78FB512D6DE8FD08886A2B14449B546 --mojo-platform-channel-handle=1944 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:776
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD522c37319f27063acd46c69f95c7c7ad1
SHA1be2459811b35dc30659b4c00bcc3b159a12a64e5
SHA256bf8bdf16c8011bbf8790d48c520e99db67637914650e8be49fe8afbaa909af5b
SHA512cc0830a199e18cc14b57cc2eba2c0301217dcc2cc7e983068c58d2453e65e4b206bdb5fa9d591bd3e6bf206fe59f07c2eb5fccd93890c3474fc3977a5381195a
-
Filesize
64KB
MD55101242501604e49b225882cc9927588
SHA1b455e5deb611ab9ff2fc076cddecbe8f2b70807d
SHA2568a184add339e02bdac5d170ccae0bc36446e021a49cd386ca93c86e16e5adf6f
SHA5122ca5987050a99c79ab8358fa2476c2f890b61ca2387781678112ce116e56fe5828aabccfe6b59a6301925d75aa3645f9567a31b4e76369088ac06886de398bc9