Analysis
-
max time kernel
152s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 23:30
Behavioral task
behavioral1
Sample
f8fd8b1a05399a47f63fe58f641594f1_JaffaCakes118.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f8fd8b1a05399a47f63fe58f641594f1_JaffaCakes118.pdf
Resource
win10v2004-20240226-en
General
-
Target
f8fd8b1a05399a47f63fe58f641594f1_JaffaCakes118.pdf
-
Size
43KB
-
MD5
f8fd8b1a05399a47f63fe58f641594f1
-
SHA1
947d84f7f85f636d06ee309a2558238051ff7513
-
SHA256
8647b516a0076766601ec7505dc3994774973d17849201fec607b8041fa99dc1
-
SHA512
c31ff0dcbebb47507bb842297b8344c8ec5940b9cf2e4a803af8d4aa69595c209750f5b9eefbc34c5a52aec3bd371a1f27437eaf755be8ccb70ceba53fe4251f
-
SSDEEP
768:LIKs6RgvMbEfn6L17AmXt95PRWBDTAP83SENMuwEkToAWiFARTRVCJL:HRI6w8F95PQvAPuSENMupksVSARTLCF
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2472 AcroRd32.exe 2472 AcroRd32.exe 2472 AcroRd32.exe 2472 AcroRd32.exe 2472 AcroRd32.exe 2472 AcroRd32.exe 2472 AcroRd32.exe 2472 AcroRd32.exe 2472 AcroRd32.exe 2472 AcroRd32.exe 2472 AcroRd32.exe 2472 AcroRd32.exe 2472 AcroRd32.exe 2472 AcroRd32.exe 2472 AcroRd32.exe 2472 AcroRd32.exe 2472 AcroRd32.exe 2472 AcroRd32.exe 2472 AcroRd32.exe 2472 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2472 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2472 AcroRd32.exe 2472 AcroRd32.exe 2472 AcroRd32.exe 2472 AcroRd32.exe 2472 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2964 2472 AcroRd32.exe 95 PID 2472 wrote to memory of 2964 2472 AcroRd32.exe 95 PID 2472 wrote to memory of 2964 2472 AcroRd32.exe 95 PID 2472 wrote to memory of 404 2472 AcroRd32.exe 97 PID 2472 wrote to memory of 404 2472 AcroRd32.exe 97 PID 2472 wrote to memory of 404 2472 AcroRd32.exe 97 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 3084 2964 RdrCEF.exe 100 PID 2964 wrote to memory of 4756 2964 RdrCEF.exe 101 PID 2964 wrote to memory of 4756 2964 RdrCEF.exe 101 PID 2964 wrote to memory of 4756 2964 RdrCEF.exe 101 PID 2964 wrote to memory of 4756 2964 RdrCEF.exe 101 PID 2964 wrote to memory of 4756 2964 RdrCEF.exe 101 PID 2964 wrote to memory of 4756 2964 RdrCEF.exe 101 PID 2964 wrote to memory of 4756 2964 RdrCEF.exe 101 PID 2964 wrote to memory of 4756 2964 RdrCEF.exe 101 PID 2964 wrote to memory of 4756 2964 RdrCEF.exe 101 PID 2964 wrote to memory of 4756 2964 RdrCEF.exe 101 PID 2964 wrote to memory of 4756 2964 RdrCEF.exe 101 PID 2964 wrote to memory of 4756 2964 RdrCEF.exe 101 PID 2964 wrote to memory of 4756 2964 RdrCEF.exe 101 PID 2964 wrote to memory of 4756 2964 RdrCEF.exe 101 PID 2964 wrote to memory of 4756 2964 RdrCEF.exe 101
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\f8fd8b1a05399a47f63fe58f641594f1_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=32530421725C5F3F28C4E2EB392E7944 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=32530421725C5F3F28C4E2EB392E7944 --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:13⤵PID:3084
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B18445C884407CD95FDA291824D50DD4 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4756
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=984D137DE01AD6BED485DEA1528054C4 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=984D137DE01AD6BED485DEA1528054C4 --renderer-client-id=4 --mojo-platform-channel-handle=2164 --allow-no-sandbox-job /prefetch:13⤵PID:5064
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B65B8FEDDA6457AD564FE866779DFF8E --mojo-platform-channel-handle=2548 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:448
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6146CAB9E1903E10DED0040573BDBF37 --mojo-platform-channel-handle=2564 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4628
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B172E469CBD84FBFCFECB9CA75BFF3B5 --mojo-platform-channel-handle=2676 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2172
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5012
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:4688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD52a6451b492184ffb12f432999d090f80
SHA1e1ef82c759a11390525835828009bde26161c812
SHA2561c7e0c7b84ff73ec1b2c9013c3639286c5fb39104e26cb8869189ee5be50dab3
SHA512a2d482dc501d781186e4731c0ea15b5dd5fa5a65688cdc39bf4e86327a58fcd12aa600056c3397bead0e92160b59ea8073b21819a904e869d7873fa745a29f5c
-
Filesize
64KB
MD522a2e78c515879ab2509c76254a17e73
SHA156db1f107d4489f00487dc1f8f730ae681fd356d
SHA256f0919e5d82d6247ef9437e89e07af4a499bc0653edf1e468664c300f878691e1
SHA512f5bfbf04d45e5d53a3f6e5e0cd149419909274e2a32553aec69b37f22f54ed1fe8b62ad4a651ee4850de8e97fab74a7c49db676a514e0552bfc02a808d2a9279
-
Filesize
56KB
MD5c26ed30e7d5ab440480838636efc41db
SHA1c66e0d00b56abebfb60d2fcc5cf85ad31a0d6591
SHA2566a3c5c4a8e57f77ecc22078fbf603ecc31fb82d429bd87b7b4b9261447092aef
SHA51296cdb78bca3e01d4513c31661987e5646e6a8ff24708918aa0d66dfa3ca5d98af4862c9f38c4f41f933c345d2d3adfb1d34d1430b33f45f916f41a9872a030df
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5