Analysis
-
max time kernel
141s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 06:25
Behavioral task
behavioral1
Sample
28b3aef3289cb85d481edc3831aa16cf_JaffaCakes118.pdf
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
28b3aef3289cb85d481edc3831aa16cf_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
28b3aef3289cb85d481edc3831aa16cf_JaffaCakes118.pdf
-
Size
41KB
-
MD5
28b3aef3289cb85d481edc3831aa16cf
-
SHA1
cabffe0b15941881fbaa0eddbdbf618fbf41d676
-
SHA256
d52b490dd9650f7d5ee6ff8362650a058d807cb469eade79049f020c839731c7
-
SHA512
f777bfd7bd355d113dfb7ec5c7d305fdd2c8f30054e9e6b8ff88c80823a5a953019ef700fa30b361ad046f25084863c58cf18e1a2d5fe3510fa9befc0144fd67
-
SSDEEP
768:pJiQGzPXour39XtbQRmSGPI1yFzreWAA9nHZOkFHhX42XHxJbzJIKU:7JGzPXR3xrRAA9HhFVTXHxJbNIKU
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3192 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3192 AcroRd32.exe 3192 AcroRd32.exe 3192 AcroRd32.exe 3192 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3192 wrote to memory of 1544 3192 AcroRd32.exe 83 PID 3192 wrote to memory of 1544 3192 AcroRd32.exe 83 PID 3192 wrote to memory of 1544 3192 AcroRd32.exe 83 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3220 1544 RdrCEF.exe 84 PID 1544 wrote to memory of 3188 1544 RdrCEF.exe 85 PID 1544 wrote to memory of 3188 1544 RdrCEF.exe 85 PID 1544 wrote to memory of 3188 1544 RdrCEF.exe 85 PID 1544 wrote to memory of 3188 1544 RdrCEF.exe 85 PID 1544 wrote to memory of 3188 1544 RdrCEF.exe 85 PID 1544 wrote to memory of 3188 1544 RdrCEF.exe 85 PID 1544 wrote to memory of 3188 1544 RdrCEF.exe 85 PID 1544 wrote to memory of 3188 1544 RdrCEF.exe 85 PID 1544 wrote to memory of 3188 1544 RdrCEF.exe 85 PID 1544 wrote to memory of 3188 1544 RdrCEF.exe 85 PID 1544 wrote to memory of 3188 1544 RdrCEF.exe 85 PID 1544 wrote to memory of 3188 1544 RdrCEF.exe 85 PID 1544 wrote to memory of 3188 1544 RdrCEF.exe 85 PID 1544 wrote to memory of 3188 1544 RdrCEF.exe 85 PID 1544 wrote to memory of 3188 1544 RdrCEF.exe 85 PID 1544 wrote to memory of 3188 1544 RdrCEF.exe 85 PID 1544 wrote to memory of 3188 1544 RdrCEF.exe 85 PID 1544 wrote to memory of 3188 1544 RdrCEF.exe 85 PID 1544 wrote to memory of 3188 1544 RdrCEF.exe 85 PID 1544 wrote to memory of 3188 1544 RdrCEF.exe 85
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\28b3aef3289cb85d481edc3831aa16cf_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F841F028ABCB5F6CFEA2B9369B74E2A8 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3220
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=B3971A81E01425F180AC27DF7401095E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=B3971A81E01425F180AC27DF7401095E --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:13⤵PID:3188
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8552233BBC38713883E3323C2E46995D --mojo-platform-channel-handle=2288 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2568
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D90B1DBF4F4F8124E7B17548DB5FB6B3 --mojo-platform-channel-handle=1948 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:5052
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2B40C0380B51B4D163CD4D472ED506D3 --mojo-platform-channel-handle=2416 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:760
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=25D98CE89ECA176697C0D558FE8DC639 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=25D98CE89ECA176697C0D558FE8DC639 --renderer-client-id=7 --mojo-platform-channel-handle=2312 --allow-no-sandbox-job /prefetch:13⤵PID:400
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5ed44fbb51c0262b5f13f02513f2a1980
SHA16ef889d44ca65310a35b8cdb3062c3ac4695a868
SHA256bd836c62efc68e0a3825a6131e9769162e1cb5e05542cae7415b0c4278d9771b
SHA512f8588c400585000c56bab945050bc72ce01638792c28b17cad3a2b2494a1bdd60106118efef52969de02e6883455905e9d7aa0ebabe133513dc3bf6c792bb077
-
Filesize
64KB
MD585ae2496e9cc16625f30475910109dd0
SHA1f4fde3749bf4fdd95db057b07e4f70e89248f881
SHA2563013a3d8aec960bf10971ef3d4c24a5b88cb454a991e0d95b93fae52ccc3fe0c
SHA5120acc7e54a8787382a4e38650180088376f00990aeff454ac1d1c0d4dad5fe5ea6ab0bdbb2d093d85c07ad5cd02acd3f5b89fd28d033fa20661098e1798c97a3d