Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2024, 16:35
Behavioral task
behavioral1
Sample
fd29593fea1003c371b86ff4f43a1bea_JaffaCakes118.pdf
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fd29593fea1003c371b86ff4f43a1bea_JaffaCakes118.pdf
Resource
win10v2004-20240412-en
General
-
Target
fd29593fea1003c371b86ff4f43a1bea_JaffaCakes118.pdf
-
Size
85KB
-
MD5
fd29593fea1003c371b86ff4f43a1bea
-
SHA1
d3333de4a5953eef8e922602031c480cdeaa0fc6
-
SHA256
8dbae223308c2de47bba0292da47f32212e2dee8829ee0177a4b652d3916443a
-
SHA512
5302393850fca061ed32e878c2b867bffa26bdf79cf622d1fd0049454adf2e11140cd007d954a0723f9fce27fe7c6860ac87d7a8c7f209392e0164ae8e909d5c
-
SSDEEP
1536:8SKj6WyiuP8ZI+utMHlZa9z7CLVqzZ+JfqNQQfz4E2up2OX39VIdvM7B8+k+bH+b:hKXRuPWutuLgz5zZKieYzr/IdM18+hbM
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3200 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3200 AcroRd32.exe 3200 AcroRd32.exe 3200 AcroRd32.exe 3200 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3200 wrote to memory of 5720 3200 AcroRd32.exe 87 PID 3200 wrote to memory of 5720 3200 AcroRd32.exe 87 PID 3200 wrote to memory of 5720 3200 AcroRd32.exe 87 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 512 5720 RdrCEF.exe 88 PID 5720 wrote to memory of 3868 5720 RdrCEF.exe 89 PID 5720 wrote to memory of 3868 5720 RdrCEF.exe 89 PID 5720 wrote to memory of 3868 5720 RdrCEF.exe 89 PID 5720 wrote to memory of 3868 5720 RdrCEF.exe 89 PID 5720 wrote to memory of 3868 5720 RdrCEF.exe 89 PID 5720 wrote to memory of 3868 5720 RdrCEF.exe 89 PID 5720 wrote to memory of 3868 5720 RdrCEF.exe 89 PID 5720 wrote to memory of 3868 5720 RdrCEF.exe 89 PID 5720 wrote to memory of 3868 5720 RdrCEF.exe 89 PID 5720 wrote to memory of 3868 5720 RdrCEF.exe 89 PID 5720 wrote to memory of 3868 5720 RdrCEF.exe 89 PID 5720 wrote to memory of 3868 5720 RdrCEF.exe 89 PID 5720 wrote to memory of 3868 5720 RdrCEF.exe 89 PID 5720 wrote to memory of 3868 5720 RdrCEF.exe 89 PID 5720 wrote to memory of 3868 5720 RdrCEF.exe 89 PID 5720 wrote to memory of 3868 5720 RdrCEF.exe 89 PID 5720 wrote to memory of 3868 5720 RdrCEF.exe 89 PID 5720 wrote to memory of 3868 5720 RdrCEF.exe 89 PID 5720 wrote to memory of 3868 5720 RdrCEF.exe 89 PID 5720 wrote to memory of 3868 5720 RdrCEF.exe 89
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\fd29593fea1003c371b86ff4f43a1bea_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:5720 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FE42125F615D9357C421E2847DFDF52F --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:512
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C9304BBBD638F1FA926FC9B54D0B8759 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C9304BBBD638F1FA926FC9B54D0B8759 --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:13⤵PID:3868
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=612E60E6F5160AB99DD002C0B3820575 --mojo-platform-channel-handle=2284 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2700
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BA423B767C401176FDFB86F199E6879A --mojo-platform-channel-handle=1936 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4944
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=DC2A98BDA91231772A22F13D99E7BCA1 --mojo-platform-channel-handle=2308 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1904
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=0AD0E5447ED3264F1B6461B64E22ECF7 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=0AD0E5447ED3264F1B6461B64E22ECF7 --renderer-client-id=7 --mojo-platform-channel-handle=2388 --allow-no-sandbox-job /prefetch:13⤵PID:1796
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5be9e210915cfa76fddde21f82d0eb7a3
SHA1643296b0dc2436aa395dc4dad74b9df5f8f0388e
SHA256eb04e31ddff5c7ce2725e9fc8c8c393a45fa40aec4b978491120f1a625c1e5bf
SHA5121f7237101bd950619a4e05702856b0045d873c48fd82b082ff9b202d6cf3d949c65783d9f017852705558a87ccac3e45b5d3aad5d1c29ce757631fe131f875da
-
Filesize
64KB
MD59030a5657d79636f292c778fbd4fc0cd
SHA1bdc4f6ec7c28bab4e3e8ff5559029f1a463fad4c
SHA2563d8563ca58cc6e0941cad690b317584a68058802092b70d1b02802ab249fb9dc
SHA512d0dfa89b4957fa2119a5a86e7a8479037b44c03920fcbd2bfd4ec7e632df4282e4422e45a166c0148aff20bd376efbc92b004e2a7e556d8e44a414daeb9b46ce