Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-04-2024 20:56
Behavioral task
behavioral1
Sample
000f1e3348b3fe3c287af19eb4365e01_JaffaCakes118.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
000f1e3348b3fe3c287af19eb4365e01_JaffaCakes118.pdf
Resource
win10v2004-20240226-en
General
-
Target
000f1e3348b3fe3c287af19eb4365e01_JaffaCakes118.pdf
-
Size
49KB
-
MD5
000f1e3348b3fe3c287af19eb4365e01
-
SHA1
7ba31939f1cb14f2e9a0600bb35b4e36c6a33bfe
-
SHA256
715bd78142fd6b0e369cb1180a35e141adede179ceb77758bb1cf8718f329099
-
SHA512
eda406e03a50ae2e9911bbe09fac28b7cd6a39951cd80f45cb649f215ee47f2c8259651a58c9856cb1f0fa6a786c1d52fd2ad3c5132ee287b31d9c177c799d57
-
SSDEEP
768:egGzpDUpPnHCRrzFMOvNqEJK5GIc9kQHzyJEC2H7jG+IAcvdhKWlgSJnHz3N9:bGF4p6A8KuHGJExHHQTKWlgSJnHz99
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
AcroRd32.exepid process 1424 AcroRd32.exe 1424 AcroRd32.exe 1424 AcroRd32.exe 1424 AcroRd32.exe 1424 AcroRd32.exe 1424 AcroRd32.exe 1424 AcroRd32.exe 1424 AcroRd32.exe 1424 AcroRd32.exe 1424 AcroRd32.exe 1424 AcroRd32.exe 1424 AcroRd32.exe 1424 AcroRd32.exe 1424 AcroRd32.exe 1424 AcroRd32.exe 1424 AcroRd32.exe 1424 AcroRd32.exe 1424 AcroRd32.exe 1424 AcroRd32.exe 1424 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 1424 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
AcroRd32.exepid process 1424 AcroRd32.exe 1424 AcroRd32.exe 1424 AcroRd32.exe 1424 AcroRd32.exe 1424 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 1424 wrote to memory of 3652 1424 AcroRd32.exe RdrCEF.exe PID 1424 wrote to memory of 3652 1424 AcroRd32.exe RdrCEF.exe PID 1424 wrote to memory of 3652 1424 AcroRd32.exe RdrCEF.exe PID 1424 wrote to memory of 60 1424 AcroRd32.exe RdrCEF.exe PID 1424 wrote to memory of 60 1424 AcroRd32.exe RdrCEF.exe PID 1424 wrote to memory of 60 1424 AcroRd32.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 4704 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 1520 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 1520 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 1520 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 1520 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 1520 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 1520 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 1520 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 1520 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 1520 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 1520 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 1520 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 1520 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 1520 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 1520 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 1520 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 1520 3652 RdrCEF.exe RdrCEF.exe PID 3652 wrote to memory of 1520 3652 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\000f1e3348b3fe3c287af19eb4365e01_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E41274010694027FED3BCCCAEF9708AA --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=107DD1A08BC416601CBD1B2AC0C05AD7 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=107DD1A08BC416601CBD1B2AC0C05AD7 --renderer-client-id=2 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=40371C62A794E03E4CB3A2DFB7E699EA --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=40371C62A794E03E4CB3A2DFB7E699EA --renderer-client-id=4 --mojo-platform-channel-handle=2176 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=11E29E5C3CFFD67A4320D0BA00A8EF55 --mojo-platform-channel-handle=2560 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=EEE9E303F232C34618CBCE3F8B8099C8 --mojo-platform-channel-handle=1888 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=806EE56FB8DFB2D9815B7C56E1DD9CED --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3020 --field-trial-handle=3060,i,1774866140584649235,8085848018931772189,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessagesFilesize
64KB
MD572f8c916a005eb9a39c15363302190f8
SHA1abca4e293e65b620cdbd235b9abecd8dd4481de6
SHA25684e2e11cf9a6920b3f76d791dc12a299545adbc739e4e545f243b455b31f2775
SHA512e75af1ad7c04cb36636f4a2c3a2d4ab8198c83f1b20bec4fd1586bd94009f85d03cf1f7364678a3d0f1eee812900d31984743f6395b4673f3a321772755cd9bb
-
C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessagesFilesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5