Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 01:52
Behavioral task
behavioral1
Sample
321f6501a223631bc6f769ad184e9131_JaffaCakes118.pdf
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
321f6501a223631bc6f769ad184e9131_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
321f6501a223631bc6f769ad184e9131_JaffaCakes118.pdf
-
Size
42KB
-
MD5
321f6501a223631bc6f769ad184e9131
-
SHA1
5bdfaf62a427cf578825ce5317746f35642bfc1f
-
SHA256
ff5013513e1ec57e4be61493d9c02a22fa1f75640f28418ab2f266dc5a64ca36
-
SHA512
edf01e19b286249e7ebf1953c877f557d489aafd2c268335eab395c14c7feac8719615f8db3a80ac1d0986e209d0f61016863c5e5f7d1312cfcfebe1af902c86
-
SSDEEP
768:CgGzpDeWBy2GagvkxqX2vTDE2F7333oT8MycwlUjrnhmz9EZE:fGFQqqXCTI2d333oTPycznhmz9+E
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 372 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 372 AcroRd32.exe 372 AcroRd32.exe 372 AcroRd32.exe 372 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 372 wrote to memory of 4932 372 AcroRd32.exe 87 PID 372 wrote to memory of 4932 372 AcroRd32.exe 87 PID 372 wrote to memory of 4932 372 AcroRd32.exe 87 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4428 4932 RdrCEF.exe 88 PID 4932 wrote to memory of 4972 4932 RdrCEF.exe 89 PID 4932 wrote to memory of 4972 4932 RdrCEF.exe 89 PID 4932 wrote to memory of 4972 4932 RdrCEF.exe 89 PID 4932 wrote to memory of 4972 4932 RdrCEF.exe 89 PID 4932 wrote to memory of 4972 4932 RdrCEF.exe 89 PID 4932 wrote to memory of 4972 4932 RdrCEF.exe 89 PID 4932 wrote to memory of 4972 4932 RdrCEF.exe 89 PID 4932 wrote to memory of 4972 4932 RdrCEF.exe 89 PID 4932 wrote to memory of 4972 4932 RdrCEF.exe 89 PID 4932 wrote to memory of 4972 4932 RdrCEF.exe 89 PID 4932 wrote to memory of 4972 4932 RdrCEF.exe 89 PID 4932 wrote to memory of 4972 4932 RdrCEF.exe 89 PID 4932 wrote to memory of 4972 4932 RdrCEF.exe 89 PID 4932 wrote to memory of 4972 4932 RdrCEF.exe 89 PID 4932 wrote to memory of 4972 4932 RdrCEF.exe 89 PID 4932 wrote to memory of 4972 4932 RdrCEF.exe 89 PID 4932 wrote to memory of 4972 4932 RdrCEF.exe 89 PID 4932 wrote to memory of 4972 4932 RdrCEF.exe 89 PID 4932 wrote to memory of 4972 4932 RdrCEF.exe 89 PID 4932 wrote to memory of 4972 4932 RdrCEF.exe 89
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\321f6501a223631bc6f769ad184e9131_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=56FB4EDB6B82E492FBF9D70CED555031 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4428
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=6136D48B6DD3D74B05A1D2C2B0CA3FEA --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=6136D48B6DD3D74B05A1D2C2B0CA3FEA --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:13⤵PID:4972
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=AE99F4B316639F91D7A8653CCC4036FD --mojo-platform-channel-handle=1804 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4596
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=DD0A606147BCE513CEA72C34569AB785 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=DD0A606147BCE513CEA72C34569AB785 --renderer-client-id=5 --mojo-platform-channel-handle=2324 --allow-no-sandbox-job /prefetch:13⤵PID:1812
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=616DE7DD8AA308AADD92C64A25098A62 --mojo-platform-channel-handle=2576 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:448
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0982CB8508C4630698053B26E9053053 --mojo-platform-channel-handle=1840 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1932
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD54774fdf60ac4649946c8a14101a9044e
SHA1d87a8dd9b36c5f3c2d02d77bf2792a78e46c20ba
SHA256673877fc547808b1063d1711632f2794f404dfa5b505702aa94f056fd3c013f0
SHA512504646db2224eb9f6f39a23547259b3e37b35fa6ab1004ea41ef88fe6925410a94680294d020f6d27224cdcdabd6614a2a3e1d4a03a17938680555e675511ebb
-
Filesize
64KB
MD5ed9133de079fc4becaf4436ae48d9709
SHA1255a09e1214133a1bcefa958cd9239bb1b63d70d
SHA2567e9045cf33fb7df7489a769d21efbbe6259ee230ad989c57288dfc99a3107f4e
SHA512cabdde5077ada83666b60f93a8f78bffb6f041cd4b64ab38cc7b4226ad28b150828ed6a4c1e8b4cb338763f9d0b08d0deafd49a0086c5e136a3b50dbfc6c0ee6