Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 19:10
Behavioral task
behavioral1
Sample
f1b74c78415ef4e628b8f1c415b676a2_JaffaCakes118.pdf
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f1b74c78415ef4e628b8f1c415b676a2_JaffaCakes118.pdf
Resource
win10v2004-20240226-en
General
-
Target
f1b74c78415ef4e628b8f1c415b676a2_JaffaCakes118.pdf
-
Size
81KB
-
MD5
f1b74c78415ef4e628b8f1c415b676a2
-
SHA1
4dd6617cd94f771cab8d405dbdff46137da9c7b8
-
SHA256
1413382cd76fd00fc7ed4c42517f44f798871ee11e66947426d7db2a394ab971
-
SHA512
88b8c92c1301307187e3d94afa512d1bbdd95dfb0c6ab68460877e438d70c1974fdbc0f4280822ae823ad8c7429cb017627ce9bd40ac881d95b174fb228fc121
-
SSDEEP
1536:4wES4dJmX2FPRZ7ffsy1BtvlMBlB1f82c6SYgWcpOydXax7dwWxvcKvJFdRlz:zSJmuRZ7My13aBlB1UcryQXpvlFP
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1596 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe 1596 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1596 wrote to memory of 3812 1596 AcroRd32.exe 96 PID 1596 wrote to memory of 3812 1596 AcroRd32.exe 96 PID 1596 wrote to memory of 3812 1596 AcroRd32.exe 96 PID 1596 wrote to memory of 3920 1596 AcroRd32.exe 98 PID 1596 wrote to memory of 3920 1596 AcroRd32.exe 98 PID 1596 wrote to memory of 3920 1596 AcroRd32.exe 98 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 4052 3812 RdrCEF.exe 99 PID 3812 wrote to memory of 1148 3812 RdrCEF.exe 100 PID 3812 wrote to memory of 1148 3812 RdrCEF.exe 100 PID 3812 wrote to memory of 1148 3812 RdrCEF.exe 100 PID 3812 wrote to memory of 1148 3812 RdrCEF.exe 100 PID 3812 wrote to memory of 1148 3812 RdrCEF.exe 100 PID 3812 wrote to memory of 1148 3812 RdrCEF.exe 100 PID 3812 wrote to memory of 1148 3812 RdrCEF.exe 100 PID 3812 wrote to memory of 1148 3812 RdrCEF.exe 100 PID 3812 wrote to memory of 1148 3812 RdrCEF.exe 100 PID 3812 wrote to memory of 1148 3812 RdrCEF.exe 100 PID 3812 wrote to memory of 1148 3812 RdrCEF.exe 100 PID 3812 wrote to memory of 1148 3812 RdrCEF.exe 100 PID 3812 wrote to memory of 1148 3812 RdrCEF.exe 100 PID 3812 wrote to memory of 1148 3812 RdrCEF.exe 100 PID 3812 wrote to memory of 1148 3812 RdrCEF.exe 100 PID 3812 wrote to memory of 1148 3812 RdrCEF.exe 100 PID 3812 wrote to memory of 1148 3812 RdrCEF.exe 100
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\f1b74c78415ef4e628b8f1c415b676a2_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=410A843DFFB667F079B2AD5A8F347CCF --mojo-platform-channel-handle=1736 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4052
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=2C25785FE6E4078A2CF5F3CD5B42E98C --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=2C25785FE6E4078A2CF5F3CD5B42E98C --renderer-client-id=2 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job /prefetch:13⤵PID:1148
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=DCECCCC6C86A21516EB34AB8E8158187 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=DCECCCC6C86A21516EB34AB8E8158187 --renderer-client-id=4 --mojo-platform-channel-handle=2176 --allow-no-sandbox-job /prefetch:13⤵PID:536
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=74D5C0FFAA4B327565A0C2572F983A12 --mojo-platform-channel-handle=2564 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3804
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=37DD8566C46041D8D644E4378689FA22 --mojo-platform-channel-handle=1908 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4732
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=012B630818DF4317EE3B16C3868E5E21 --mojo-platform-channel-handle=2672 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:64
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:3920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2696
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5248 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:3964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5a7393b40d165a28c9b486eebc2450746
SHA1ce4c9e6f8f3d9cb8239ad3f1e5fedd55eb682586
SHA2565363bf2e237519a73504f202ea5f44bd3eeb168cc2001afcad00150626c3bf0e
SHA5123b6d473f36a0847d523f9838448f876ad3596971a29d9342131fc14a232d703e4b46792115ca833d8deedd18ddc19abfcacfe311818c27d24c3d9ed876026959
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5