Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 22:19
Behavioral task
behavioral1
Sample
f20e909a6542c48ff944a1f355728563_JaffaCakes118.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f20e909a6542c48ff944a1f355728563_JaffaCakes118.pdf
Resource
win10v2004-20240412-en
General
-
Target
f20e909a6542c48ff944a1f355728563_JaffaCakes118.pdf
-
Size
41KB
-
MD5
f20e909a6542c48ff944a1f355728563
-
SHA1
0fe3b87348360bd634df594bd5844edb68e10792
-
SHA256
bc7b22dd81e19df542d81c5129995359661ab89c54e66be5a3e2c7c984dc13b5
-
SHA512
927f3e7d6b85bc19aa622bc497080099e1a87d26fde0b7252932e3e1d8f873d4cdbb8e29e9d910d1206f7ad4d1ee9797c4caf7462dceb21bd7ef6b74161fe496
-
SSDEEP
768:985x66qEkIFF7b3DmxGY/9ep+SWyD6+ieINkiHKk7Q1ODewnUvgJ3Fi:a5x66TkY3zg/QQ26+ieUkiHNOmUvq1i
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1664 AcroRd32.exe 1664 AcroRd32.exe 1664 AcroRd32.exe 1664 AcroRd32.exe 1664 AcroRd32.exe 1664 AcroRd32.exe 1664 AcroRd32.exe 1664 AcroRd32.exe 1664 AcroRd32.exe 1664 AcroRd32.exe 1664 AcroRd32.exe 1664 AcroRd32.exe 1664 AcroRd32.exe 1664 AcroRd32.exe 1664 AcroRd32.exe 1664 AcroRd32.exe 1664 AcroRd32.exe 1664 AcroRd32.exe 1664 AcroRd32.exe 1664 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1664 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1664 AcroRd32.exe 1664 AcroRd32.exe 1664 AcroRd32.exe 1664 AcroRd32.exe 1664 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1664 wrote to memory of 3524 1664 AcroRd32.exe 88 PID 1664 wrote to memory of 3524 1664 AcroRd32.exe 88 PID 1664 wrote to memory of 3524 1664 AcroRd32.exe 88 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 2568 3524 RdrCEF.exe 90 PID 3524 wrote to memory of 836 3524 RdrCEF.exe 91 PID 3524 wrote to memory of 836 3524 RdrCEF.exe 91 PID 3524 wrote to memory of 836 3524 RdrCEF.exe 91 PID 3524 wrote to memory of 836 3524 RdrCEF.exe 91 PID 3524 wrote to memory of 836 3524 RdrCEF.exe 91 PID 3524 wrote to memory of 836 3524 RdrCEF.exe 91 PID 3524 wrote to memory of 836 3524 RdrCEF.exe 91 PID 3524 wrote to memory of 836 3524 RdrCEF.exe 91 PID 3524 wrote to memory of 836 3524 RdrCEF.exe 91 PID 3524 wrote to memory of 836 3524 RdrCEF.exe 91 PID 3524 wrote to memory of 836 3524 RdrCEF.exe 91 PID 3524 wrote to memory of 836 3524 RdrCEF.exe 91 PID 3524 wrote to memory of 836 3524 RdrCEF.exe 91 PID 3524 wrote to memory of 836 3524 RdrCEF.exe 91 PID 3524 wrote to memory of 836 3524 RdrCEF.exe 91 PID 3524 wrote to memory of 836 3524 RdrCEF.exe 91 PID 3524 wrote to memory of 836 3524 RdrCEF.exe 91 PID 3524 wrote to memory of 836 3524 RdrCEF.exe 91 PID 3524 wrote to memory of 836 3524 RdrCEF.exe 91 PID 3524 wrote to memory of 836 3524 RdrCEF.exe 91
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\f20e909a6542c48ff944a1f355728563_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=ACEAB6A0E1B5612AA14EA72BE7761A93 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2568
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=15F2278DE72425789863521D953C60C0 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=15F2278DE72425789863521D953C60C0 --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:13⤵PID:836
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=86CCBEF37AB71A3260C1AC1A1E7C6D4B --mojo-platform-channel-handle=2296 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2484
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4E06652B8A97C16FD4E02305D1905028 --mojo-platform-channel-handle=2424 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1556
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1DE56F9B7300F2C08AF54A1C1B9624D0 --mojo-platform-channel-handle=2312 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3984
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=CBB399E5CE625289B9C1B2220C4EB67E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=CBB399E5CE625289B9C1B2220C4EB67E --renderer-client-id=7 --mojo-platform-channel-handle=2320 --allow-no-sandbox-job /prefetch:13⤵PID:4536
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD53b1c6c134c688c8c3023fb75251fa285
SHA1ae4c038feabccf484b7cde95fae97517ce56fe38
SHA25686a19e01e5392f187261ce3b900819d187595f929c7d6d570740feb967b3d66a
SHA512b437e5ba127fe4bc6496f1ece74d68aca97b08f2e499ddb8bdd86497034f2f3cd5b20a3b84144e11fdfc1b89b86220b12215ac3db940a3ebdd4e9a7dd2addc2a
-
Filesize
56KB
MD5c26ed30e7d5ab440480838636efc41db
SHA1c66e0d00b56abebfb60d2fcc5cf85ad31a0d6591
SHA2566a3c5c4a8e57f77ecc22078fbf603ecc31fb82d429bd87b7b4b9261447092aef
SHA51296cdb78bca3e01d4513c31661987e5646e6a8ff24708918aa0d66dfa3ca5d98af4862c9f38c4f41f933c345d2d3adfb1d34d1430b33f45f916f41a9872a030df
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5