Analysis
-
max time kernel
92s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 02:10
Behavioral task
behavioral1
Sample
32300cc82882d0763fdf16a7321afa83_JaffaCakes118.pdf
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
32300cc82882d0763fdf16a7321afa83_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
32300cc82882d0763fdf16a7321afa83_JaffaCakes118.pdf
-
Size
42KB
-
MD5
32300cc82882d0763fdf16a7321afa83
-
SHA1
caee6efefbb8ff77c94e1c39f9d864c619b18f1e
-
SHA256
50a21de4a52f273fe4fc82fc458651fd4e9d7496f29acd27a532ad70d85d3fbd
-
SHA512
ce43e1212bacdf5a386115d7f2eb5f5533e26a7d188c4c2471f9fd56adb67c466c785d6e1b71e84f1b708d866a7044a55598710ecc015662ad799f3123804574
-
SSDEEP
768:xXuMZmwgCLWarJeUH3nF+u475b/dIfHnZbwtMnQWi8reMGnCPLghppkYpw1EFFDh:xXFZmGWSJeUXnt475b/dEHnZbx1FreMk
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2028 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2028 AcroRd32.exe 2028 AcroRd32.exe 2028 AcroRd32.exe 2028 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2028 wrote to memory of 3340 2028 AcroRd32.exe 87 PID 2028 wrote to memory of 3340 2028 AcroRd32.exe 87 PID 2028 wrote to memory of 3340 2028 AcroRd32.exe 87 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 1540 3340 RdrCEF.exe 88 PID 3340 wrote to memory of 2412 3340 RdrCEF.exe 89 PID 3340 wrote to memory of 2412 3340 RdrCEF.exe 89 PID 3340 wrote to memory of 2412 3340 RdrCEF.exe 89 PID 3340 wrote to memory of 2412 3340 RdrCEF.exe 89 PID 3340 wrote to memory of 2412 3340 RdrCEF.exe 89 PID 3340 wrote to memory of 2412 3340 RdrCEF.exe 89 PID 3340 wrote to memory of 2412 3340 RdrCEF.exe 89 PID 3340 wrote to memory of 2412 3340 RdrCEF.exe 89 PID 3340 wrote to memory of 2412 3340 RdrCEF.exe 89 PID 3340 wrote to memory of 2412 3340 RdrCEF.exe 89 PID 3340 wrote to memory of 2412 3340 RdrCEF.exe 89 PID 3340 wrote to memory of 2412 3340 RdrCEF.exe 89 PID 3340 wrote to memory of 2412 3340 RdrCEF.exe 89 PID 3340 wrote to memory of 2412 3340 RdrCEF.exe 89 PID 3340 wrote to memory of 2412 3340 RdrCEF.exe 89 PID 3340 wrote to memory of 2412 3340 RdrCEF.exe 89 PID 3340 wrote to memory of 2412 3340 RdrCEF.exe 89 PID 3340 wrote to memory of 2412 3340 RdrCEF.exe 89 PID 3340 wrote to memory of 2412 3340 RdrCEF.exe 89 PID 3340 wrote to memory of 2412 3340 RdrCEF.exe 89
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\32300cc82882d0763fdf16a7321afa83_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8398E354A0F9FC07C03F4C748B9CA4E1 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1540
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=BCF3EC8A69DE3D394067B339EEDB9749 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=BCF3EC8A69DE3D394067B339EEDB9749 --renderer-client-id=2 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job /prefetch:13⤵PID:2412
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=15B40C73E33261CF10715AA118AE3FD4 --mojo-platform-channel-handle=2292 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1652
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3B503A2EB9FC5A55BE374D1B14CB7318 --mojo-platform-channel-handle=2348 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2076
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FED4B599E04D896E2351BD6857F45A41 --mojo-platform-channel-handle=2152 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2176
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=85B714723CD260C45484F9F0E65BE966 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=85B714723CD260C45484F9F0E65BE966 --renderer-client-id=7 --mojo-platform-channel-handle=2440 --allow-no-sandbox-job /prefetch:13⤵PID:2564
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5c7747196fd5aeff004348167dd8c163a
SHA1725b06043d33e7bee60834271410ca46d1e14764
SHA256d0ff4e76597119b702d76d3b3e57c25180816c4e47a7283c8ec41675ac483d23
SHA5128525bd160d8972817092c26ec1415a21f6bfb3e896304c4b3f79ce6c42a7968102d6338d01939466f1283e8c2c57190625350bfa895c058a7f53e17f8c766787
-
Filesize
64KB
MD5faca2b6a4c835dfa0bd5dc0da1968919
SHA15c5da6699606fbc945ad451c3185d9bd490613a1
SHA2561d3e54cc15527b90a6216a0f64345f5727b8325e8f0e9da27032862a5f9d910c
SHA51255fe2367a61fed1473a48f6f13694115876a49986ed09419523f085eec05dbf48f134c7351303913e3862f7d5895743e5968d59e2526c29838b026764b91388a