Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 09:38
Behavioral task
behavioral1
Sample
f334ba4c5b62a9ecc9890e007844c048_JaffaCakes118.pdf
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f334ba4c5b62a9ecc9890e007844c048_JaffaCakes118.pdf
Resource
win10v2004-20240412-en
General
-
Target
f334ba4c5b62a9ecc9890e007844c048_JaffaCakes118.pdf
-
Size
98KB
-
MD5
f334ba4c5b62a9ecc9890e007844c048
-
SHA1
afbcf578067be23c75340812068a2db713cdfdea
-
SHA256
7ec5b8c24f39324cf1390af9d6756045c9fa73e973440d55317943814353609e
-
SHA512
2fbb9a343ead831adbd59be98bd90f850eddde7b78b2b668a755bfe2811c990f433973f5ea06aeee0f6f6a8e5b56e9828544ec0f645ab48f439de048d3231abb
-
SSDEEP
3072:ERQJbC6W+MmTOe2YoTIwjrgu2QZ3ZipAEr:EWlC6hMP2oHHs
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3016 AcroRd32.exe 3016 AcroRd32.exe 3016 AcroRd32.exe 3016 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3016 wrote to memory of 4972 3016 AcroRd32.exe 92 PID 3016 wrote to memory of 4972 3016 AcroRd32.exe 92 PID 3016 wrote to memory of 4972 3016 AcroRd32.exe 92 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 2888 4972 RdrCEF.exe 93 PID 4972 wrote to memory of 4052 4972 RdrCEF.exe 94 PID 4972 wrote to memory of 4052 4972 RdrCEF.exe 94 PID 4972 wrote to memory of 4052 4972 RdrCEF.exe 94 PID 4972 wrote to memory of 4052 4972 RdrCEF.exe 94 PID 4972 wrote to memory of 4052 4972 RdrCEF.exe 94 PID 4972 wrote to memory of 4052 4972 RdrCEF.exe 94 PID 4972 wrote to memory of 4052 4972 RdrCEF.exe 94 PID 4972 wrote to memory of 4052 4972 RdrCEF.exe 94 PID 4972 wrote to memory of 4052 4972 RdrCEF.exe 94 PID 4972 wrote to memory of 4052 4972 RdrCEF.exe 94 PID 4972 wrote to memory of 4052 4972 RdrCEF.exe 94 PID 4972 wrote to memory of 4052 4972 RdrCEF.exe 94 PID 4972 wrote to memory of 4052 4972 RdrCEF.exe 94 PID 4972 wrote to memory of 4052 4972 RdrCEF.exe 94 PID 4972 wrote to memory of 4052 4972 RdrCEF.exe 94 PID 4972 wrote to memory of 4052 4972 RdrCEF.exe 94 PID 4972 wrote to memory of 4052 4972 RdrCEF.exe 94 PID 4972 wrote to memory of 4052 4972 RdrCEF.exe 94 PID 4972 wrote to memory of 4052 4972 RdrCEF.exe 94 PID 4972 wrote to memory of 4052 4972 RdrCEF.exe 94
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\f334ba4c5b62a9ecc9890e007844c048_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=ED8ED1C7C7870F3262AA8B2C7BDF21CF --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2888
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=840008B8FEE7DA6FE22857347E0B551E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=840008B8FEE7DA6FE22857347E0B551E --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:13⤵PID:4052
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D3564B096573771580722BA793FDB910 --mojo-platform-channel-handle=2156 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4976
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FA77196180ADD453148956330202F846 --mojo-platform-channel-handle=2340 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2804
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C5A6937246630508D10797FC536E256D --mojo-platform-channel-handle=2428 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4552
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=955CF4DAA94B53095690D3E7F834FEBC --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=955CF4DAA94B53095690D3E7F834FEBC --renderer-client-id=7 --mojo-platform-channel-handle=2524 --allow-no-sandbox-job /prefetch:13⤵PID:1712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD57a67c198e5cb2f1fe6c9f7281e90fa37
SHA199ed454755ac55881d8bc2aac276635643af116e
SHA256cc2abd1732a2286212c1f1f8c91b7888e134008972de466f9107e10e2fb7c9a3
SHA512b14d50dcb633fa58af12bab745e3c48315daae755f3deecd87a1d0eb212e92502144fb317046d2b6cbff560c409b12132e3fcf11e8336535e0af745dd088f099
-
Filesize
64KB
MD5e958c7cf0298976454008ad024a4f9db
SHA1058b08882ee817761a0b451a282deaeba663aa46
SHA256fae94aff4a89f0d06a49d015d33ee8b54ef9d5431f91deec607729c8811a1711
SHA51281332e981fc6d762e32276623ebee21515894241d9fd4c6eb67d384ef4e810834d51cff6c8989071358554027acecb0b524169de11795ed25c2006c8eb08d3f6