Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 19:31
Behavioral task
behavioral1
Sample
42b789d8d443023cf14a479727d355cc_JaffaCakes118.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
42b789d8d443023cf14a479727d355cc_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
42b789d8d443023cf14a479727d355cc_JaffaCakes118.pdf
-
Size
36KB
-
MD5
42b789d8d443023cf14a479727d355cc
-
SHA1
f29891b10a1686e0c126f83ac81e76dea460ec56
-
SHA256
4f1f7ea40ab15bc9a74efd9c1c7f747f5d4eeb7a4fe17bd1b04287fe9fe14654
-
SHA512
7b220de2c2eba70393b2365b511e6021f5d24fe64c92ade8fc07cf03d074cfc821788226ec07ada5ce4d73ab72d0fd275285fa427a60fa95ae60b502842984c3
-
SSDEEP
768:/gGzpDppgfCEFmqMPMFxbIWTFA6gwIjyala3ZzZS1w0:IGFNpguh6RIjzlaJg1w0
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1372 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1372 wrote to memory of 3736 1372 AcroRd32.exe 84 PID 1372 wrote to memory of 3736 1372 AcroRd32.exe 84 PID 1372 wrote to memory of 3736 1372 AcroRd32.exe 84 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 5052 3736 RdrCEF.exe 85 PID 3736 wrote to memory of 4124 3736 RdrCEF.exe 86 PID 3736 wrote to memory of 4124 3736 RdrCEF.exe 86 PID 3736 wrote to memory of 4124 3736 RdrCEF.exe 86 PID 3736 wrote to memory of 4124 3736 RdrCEF.exe 86 PID 3736 wrote to memory of 4124 3736 RdrCEF.exe 86 PID 3736 wrote to memory of 4124 3736 RdrCEF.exe 86 PID 3736 wrote to memory of 4124 3736 RdrCEF.exe 86 PID 3736 wrote to memory of 4124 3736 RdrCEF.exe 86 PID 3736 wrote to memory of 4124 3736 RdrCEF.exe 86 PID 3736 wrote to memory of 4124 3736 RdrCEF.exe 86 PID 3736 wrote to memory of 4124 3736 RdrCEF.exe 86 PID 3736 wrote to memory of 4124 3736 RdrCEF.exe 86 PID 3736 wrote to memory of 4124 3736 RdrCEF.exe 86 PID 3736 wrote to memory of 4124 3736 RdrCEF.exe 86 PID 3736 wrote to memory of 4124 3736 RdrCEF.exe 86 PID 3736 wrote to memory of 4124 3736 RdrCEF.exe 86 PID 3736 wrote to memory of 4124 3736 RdrCEF.exe 86 PID 3736 wrote to memory of 4124 3736 RdrCEF.exe 86 PID 3736 wrote to memory of 4124 3736 RdrCEF.exe 86 PID 3736 wrote to memory of 4124 3736 RdrCEF.exe 86
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\42b789d8d443023cf14a479727d355cc_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=604F6E46F331408C53B0FEE33391893B --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:5052
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=A72082277F28ED61C939DE10C6874606 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=A72082277F28ED61C939DE10C6874606 --renderer-client-id=2 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job /prefetch:13⤵PID:4124
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=45F0E2F4A6EE2FBD366719794192CCB8 --mojo-platform-channel-handle=2288 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2068
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=20E773DFD4173A516EE17C5303EC3F0C --mojo-platform-channel-handle=1884 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2316
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E4EBB1BDA41B7AD30A9061C8AF061F9D --mojo-platform-channel-handle=2344 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:744
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=839254DEB9C7AF3E42D4D6D55B0D03C5 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=839254DEB9C7AF3E42D4D6D55B0D03C5 --renderer-client-id=7 --mojo-platform-channel-handle=1960 --allow-no-sandbox-job /prefetch:13⤵PID:4208
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD51384a8764a34362c96ce02b7ffc12ec8
SHA1f4b3f3fd74b9d5a8b255890073b1399fd4644225
SHA25641fd8330c5382b8d7edaf0523b8cc375a7e5d622db2dba615ebb2204367e643e
SHA512e89257a78de29b264e0c0fcc8fff181131e9f00c4e6372712051c095e02b6b4fce7e4acea5d3e654ce46132e4e4e2bd93bbde5066e2b914aa07c2a6f98f75326
-
Filesize
64KB
MD522604aa6495c01f20147d61c84aa67ed
SHA18c4671c3717a5edc2adefe2f4174c01b5e0b4aeb
SHA2563a137756c19766c190ed0670af8f022844fcef2c8fa6f886fb1732707bf54cac
SHA51222dc234d4e9b3aaf3b8954368dbb656d1b02d7ba750a65714c05260724ee0476b0d62c03b97281fa534700702e8d25b3ed0ea1bae614b6e440f2534108afc812