Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 07:42
Behavioral task
behavioral1
Sample
4f08885651a86f66976140bf7dea6201_JaffaCakes118.pdf
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4f08885651a86f66976140bf7dea6201_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
4f08885651a86f66976140bf7dea6201_JaffaCakes118.pdf
-
Size
15KB
-
MD5
4f08885651a86f66976140bf7dea6201
-
SHA1
c7b152fa00c6e131279b231d22d45b4d46b1850b
-
SHA256
fd1676f1e0f3507aa1c51ebfeb6231a5429656bb07bea3003e6ced22399baa51
-
SHA512
90fa2b060a1a8b5ef33c43c2a1b4be761076df924444d4ab6d07af6e390c3992a3a388c3c344bc2330327500153d5e45f441d1ba62e71b22a4f1754ee1ec1f5e
-
SSDEEP
384:P+uMmZcyMqPd+MAOFixhyk+AhxsmB9yuAPCTO:P+ub/V+MTjxAhxt4uAaTO
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 2576 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
AcroRd32.exepid process 2576 AcroRd32.exe 2576 AcroRd32.exe 2576 AcroRd32.exe 2576 AcroRd32.exe 2576 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 2576 wrote to memory of 880 2576 AcroRd32.exe RdrCEF.exe PID 2576 wrote to memory of 880 2576 AcroRd32.exe RdrCEF.exe PID 2576 wrote to memory of 880 2576 AcroRd32.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 4696 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 3796 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 3796 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 3796 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 3796 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 3796 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 3796 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 3796 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 3796 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 3796 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 3796 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 3796 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 3796 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 3796 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 3796 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 3796 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 3796 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 3796 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 3796 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 3796 880 RdrCEF.exe RdrCEF.exe PID 880 wrote to memory of 3796 880 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\4f08885651a86f66976140bf7dea6201_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=431FC375161140B0E9E619020607C860 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=D616DCC2EC8F09C4E37F6E31871E659F --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=D616DCC2EC8F09C4E37F6E31871E659F --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5BA6E75BAAC42905AD4ECBB17AFF3D20 --mojo-platform-channel-handle=2316 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C61BA1ECE95C1B9B8C87AFBAD4B4ADFB --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C61BA1ECE95C1B9B8C87AFBAD4B4ADFB --renderer-client-id=5 --mojo-platform-channel-handle=1928 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F15CACED0591CA5278FD2A005328C3A6 --mojo-platform-channel-handle=2464 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=83122B2E9F0E92B6B3D6100DEB05F5B8 --mojo-platform-channel-handle=2400 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessagesFilesize
64KB
MD5eea18ab5e27e7a130c20ff4253a1064f
SHA102d70dfba4f47dcffcc936dc4136f4888d7d26d5
SHA25669daeeec5b45557758797bc5fe1898ae1015b2964b1205aa9bc5fe00a7a7837f
SHA512310f773e3e9a2d0509216a5a69215c46a8fc42fb82408dc0c7b425e135c9e531b871b5addb7b60011d7541bbe18dc38d9abbd0b88f617b7a05065f808658812f
-
C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessagesFilesize
64KB
MD556c368969259b101621e34a0560197f5
SHA1df02b9817fb9ff2162db91b4207201023358d04e
SHA25628b97f6687f905327ab38b5e512c736f3747f2ba74509f4b0faff8b53ee34fe8
SHA5127aed7b03fb84f1b05aec530fe313a36538d24b6a33f39801df336331d3a6530375f752e521d5f526ebe6fa3b07528b62a089a4d183978ddb4e07892fc8f1a004