Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 07:01
Behavioral task
behavioral1
Sample
fc314f436d728edd509a6c6c92251d07_JaffaCakes118.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fc314f436d728edd509a6c6c92251d07_JaffaCakes118.pdf
Resource
win10v2004-20240412-en
General
-
Target
fc314f436d728edd509a6c6c92251d07_JaffaCakes118.pdf
-
Size
16KB
-
MD5
fc314f436d728edd509a6c6c92251d07
-
SHA1
5fdc8112462fbdde6c98d01dea1c25759430fd65
-
SHA256
55e3e8a9751647ad1da44b34d5fc44effa086730ae707fec00df110933a88e94
-
SHA512
6b996332a7150232e351d2ba23516d1c6cfa55fdaa04bb709efc18fefd9dfb2e7c94785bdd64db4daa3e73f130373e8012ccfd9aaf4ccc334b482151915bdd84
-
SSDEEP
192:4ONyCeewIjJiz+MUSFVqGizqPHCAhvAhc7nwkU4XTa/nzLfkJQHvzjE5DF0vCal7:4ONyCeewIjJiz+9VkAlcuv
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4532 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe 4532 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4532 wrote to memory of 4668 4532 AcroRd32.exe 88 PID 4532 wrote to memory of 4668 4532 AcroRd32.exe 88 PID 4532 wrote to memory of 4668 4532 AcroRd32.exe 88 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 2968 4668 RdrCEF.exe 89 PID 4668 wrote to memory of 3308 4668 RdrCEF.exe 90 PID 4668 wrote to memory of 3308 4668 RdrCEF.exe 90 PID 4668 wrote to memory of 3308 4668 RdrCEF.exe 90 PID 4668 wrote to memory of 3308 4668 RdrCEF.exe 90 PID 4668 wrote to memory of 3308 4668 RdrCEF.exe 90 PID 4668 wrote to memory of 3308 4668 RdrCEF.exe 90 PID 4668 wrote to memory of 3308 4668 RdrCEF.exe 90 PID 4668 wrote to memory of 3308 4668 RdrCEF.exe 90 PID 4668 wrote to memory of 3308 4668 RdrCEF.exe 90 PID 4668 wrote to memory of 3308 4668 RdrCEF.exe 90 PID 4668 wrote to memory of 3308 4668 RdrCEF.exe 90 PID 4668 wrote to memory of 3308 4668 RdrCEF.exe 90 PID 4668 wrote to memory of 3308 4668 RdrCEF.exe 90 PID 4668 wrote to memory of 3308 4668 RdrCEF.exe 90 PID 4668 wrote to memory of 3308 4668 RdrCEF.exe 90 PID 4668 wrote to memory of 3308 4668 RdrCEF.exe 90 PID 4668 wrote to memory of 3308 4668 RdrCEF.exe 90 PID 4668 wrote to memory of 3308 4668 RdrCEF.exe 90 PID 4668 wrote to memory of 3308 4668 RdrCEF.exe 90 PID 4668 wrote to memory of 3308 4668 RdrCEF.exe 90
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\fc314f436d728edd509a6c6c92251d07_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7322118E53CC52CE874C014F9D31A533 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2968
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=99199DCC44C40EEAE9485EBD9CEBF213 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=99199DCC44C40EEAE9485EBD9CEBF213 --renderer-client-id=2 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job /prefetch:13⤵PID:3308
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0CA0C6960A4315BAC02ACB69C47BE57E --mojo-platform-channel-handle=2276 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:5464
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5D61FDE9C8FEB96B40A02187813099F9 --mojo-platform-channel-handle=1876 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3104
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6063B887DEF8F28FCC9F8B131463F473 --mojo-platform-channel-handle=2352 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4104
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=2297BB67CDDD4FA051AB6225D6109772 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=2297BB67CDDD4FA051AB6225D6109772 --renderer-client-id=7 --mojo-platform-channel-handle=2628 --allow-no-sandbox-job /prefetch:13⤵PID:5396
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD55112090a4c6ba8dc8dd6bdfd9d220126
SHA145ecb66c40b38bbdb9cc5d3d2ea100e9b95d9ad8
SHA2565497af330f2b1ef565e3310a8dbbd4277ce55c2d042bde279ae3ffcdf9649770
SHA51213f2961dc4b6a0716be10496116ff095de3bafb2915916ebc5bb3878d441702bd182136cce3b23a109f41ac7454467237b5780edbf5b9f42a9f6038dc3275081
-
Filesize
64KB
MD51b114eb9199d6e21466aa6deade322ec
SHA1c0a3ff7897d8734b91a7d5b391f7fa63485f08d4
SHA256877c398630f3e33e3f3a07f4df089380d0d06819fb1e67eae08dbcc9d2f80f23
SHA512d1ab5236b67d4982136a70fefffc5b2c830dcd41c9284a6e61d6dac5935d567fe41e9359eb0c783e2eb4d50a7ced428b673e51ddaba6b93d981081ad3f6d0ec2