Analysis
-
max time kernel
141s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 19:18
Behavioral task
behavioral1
Sample
64760e985cd1ecdd9da359ee14d6e7f3_JaffaCakes118.pdf
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
64760e985cd1ecdd9da359ee14d6e7f3_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
64760e985cd1ecdd9da359ee14d6e7f3_JaffaCakes118.pdf
-
Size
46KB
-
MD5
64760e985cd1ecdd9da359ee14d6e7f3
-
SHA1
70a5f523d07359cf5dc83808aab063fd260f1c48
-
SHA256
d933da46ce0ef94f6c61f47916c136265fd81883c10ec6f4b9c3023038ba6233
-
SHA512
914b509f071048264f95a50d29850212bc3e9e0f70c3a1da46d4fd57a780d64a6db1f8fa212929e5b086e6e69e84b121e08cdaef5500d6677b8b05885189c302
-
SSDEEP
768:ogGzpDht33v+6JEJlyhVROcT77t8eIxwfnrvol6xIRBnrnBS50egIDY1hcKtE:lGF9C0VROYueIxyano0ADY1hXtE
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 3808 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 3808 AcroRd32.exe 3808 AcroRd32.exe 3808 AcroRd32.exe 3808 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 3808 wrote to memory of 1784 3808 AcroRd32.exe RdrCEF.exe PID 3808 wrote to memory of 1784 3808 AcroRd32.exe RdrCEF.exe PID 3808 wrote to memory of 1784 3808 AcroRd32.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 2288 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 384 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 384 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 384 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 384 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 384 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 384 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 384 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 384 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 384 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 384 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 384 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 384 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 384 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 384 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 384 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 384 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 384 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 384 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 384 1784 RdrCEF.exe RdrCEF.exe PID 1784 wrote to memory of 384 1784 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\64760e985cd1ecdd9da359ee14d6e7f3_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1A58F704676CBE15A2F8A5D7CA9393FB --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2288
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=03220373DAA49F760A70C381CCD0B3E3 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=03220373DAA49F760A70C381CCD0B3E3 --renderer-client-id=2 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job /prefetch:13⤵PID:384
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6B5C36BAF753DED911505911E70259A6 --mojo-platform-channel-handle=2320 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3904
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=5D83F3B962D0B603D01CBD58F9ABF0C6 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=5D83F3B962D0B603D01CBD58F9ABF0C6 --renderer-client-id=5 --mojo-platform-channel-handle=2416 --allow-no-sandbox-job /prefetch:13⤵PID:4624
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2E391EFEC842CECA29C4A7F66C548CBC --mojo-platform-channel-handle=2700 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2956
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=843EF49E6A5834844F231A31D74F53D0 --mojo-platform-channel-handle=2404 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5faf1c24284a3332999d9743b0fdad830
SHA142e3f9128b3961c32cec799669766dd9851a66d3
SHA25686d4d5e2c920dc708818f699954ca9e55edaa1512445ae8a9a3f19454b3b8115
SHA51283503cb03bcc4e31653275517b37ae5227336698c1330896a416f8caa43c324296dd05d0ddb94ae76c0980c7bee1a2086bf8f780e7a9cd6fe3198b03195c78a6
-
Filesize
64KB
MD5860a824636cf769e1cefed75c3ac5bcf
SHA1fd0bd40283c0ceb3a03f9774841f5d938025b50d
SHA256792a3f85f9368a10289813c3dd0e64849374c5f367b1bf2542e4e760c3c8186c
SHA512cbdd3d7131ebbf02d6838f5c380997bbc676c2df08742ea81dfa5f11d2aa08ae2b1b897c590865716d324e7ebaeae6c7171d1594066f5379010850b51f3802b3