Analysis
-
max time kernel
133s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 00:22
Behavioral task
behavioral1
Sample
931cd0c5272da65d1b8000118a986853_JaffaCakes118.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
931cd0c5272da65d1b8000118a986853_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
931cd0c5272da65d1b8000118a986853_JaffaCakes118.pdf
-
Size
41KB
-
MD5
931cd0c5272da65d1b8000118a986853
-
SHA1
81e300807f501ff51ed6178c4393eeaf660e4fe3
-
SHA256
8b3c870e64a4ccce05e2b0f54d6d8e6f19cb62ea6661b3bf9e74f314e159f997
-
SHA512
03d7f9f33e71f19eae31ad229081c945e2a5223239dfa1768714fd831568a10f111ce6a29b178847f69ae3da6aa3d8c1709e7db38c50375691a2afe930956acb
-
SSDEEP
768:TPd1GkUQ7RXeyB6XV7Q5Hl67jpwaUiGv3LABdApuKHFouS+R6Vb9UJrOkNkO+YZR:TvoqXSUrc7ykX9nQ
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4624 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4624 AcroRd32.exe 4624 AcroRd32.exe 4624 AcroRd32.exe 4624 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4624 wrote to memory of 5020 4624 AcroRd32.exe 90 PID 4624 wrote to memory of 5020 4624 AcroRd32.exe 90 PID 4624 wrote to memory of 5020 4624 AcroRd32.exe 90 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4128 5020 RdrCEF.exe 91 PID 5020 wrote to memory of 4552 5020 RdrCEF.exe 92 PID 5020 wrote to memory of 4552 5020 RdrCEF.exe 92 PID 5020 wrote to memory of 4552 5020 RdrCEF.exe 92 PID 5020 wrote to memory of 4552 5020 RdrCEF.exe 92 PID 5020 wrote to memory of 4552 5020 RdrCEF.exe 92 PID 5020 wrote to memory of 4552 5020 RdrCEF.exe 92 PID 5020 wrote to memory of 4552 5020 RdrCEF.exe 92 PID 5020 wrote to memory of 4552 5020 RdrCEF.exe 92 PID 5020 wrote to memory of 4552 5020 RdrCEF.exe 92 PID 5020 wrote to memory of 4552 5020 RdrCEF.exe 92 PID 5020 wrote to memory of 4552 5020 RdrCEF.exe 92 PID 5020 wrote to memory of 4552 5020 RdrCEF.exe 92 PID 5020 wrote to memory of 4552 5020 RdrCEF.exe 92 PID 5020 wrote to memory of 4552 5020 RdrCEF.exe 92 PID 5020 wrote to memory of 4552 5020 RdrCEF.exe 92 PID 5020 wrote to memory of 4552 5020 RdrCEF.exe 92 PID 5020 wrote to memory of 4552 5020 RdrCEF.exe 92 PID 5020 wrote to memory of 4552 5020 RdrCEF.exe 92 PID 5020 wrote to memory of 4552 5020 RdrCEF.exe 92 PID 5020 wrote to memory of 4552 5020 RdrCEF.exe 92
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\931cd0c5272da65d1b8000118a986853_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=17B032C10E2B4613831ABF6239924CB1 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4128
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=DE6B27BF89164A75BA2C3A57D9ED544B --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=DE6B27BF89164A75BA2C3A57D9ED544B --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:13⤵PID:4552
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2B1A724E2A2FCE30904AAB6E178726A2 --mojo-platform-channel-handle=2288 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1904
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=AB47D6110E97BF57AE8C73FB56A147E8 --mojo-platform-channel-handle=1876 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3204
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9BB074A66B801EB69F35C714440DBCDE --mojo-platform-channel-handle=2452 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2476
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=8FABC455D17151F8612D1CA03ABB1DE1 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=8FABC455D17151F8612D1CA03ABB1DE1 --renderer-client-id=7 --mojo-platform-channel-handle=2292 --allow-no-sandbox-job /prefetch:13⤵PID:1672
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5488a25a0e3e7f2072f3178afbf416cfb
SHA1d18ee3cf44611b4323a1feb5ff200765f0375e32
SHA25638558827aa10bcdd2c181a33604eb47239d1560d5ecd9c1d60562b8ed7788be3
SHA5120d3fe3b33e284f8e0947f4282789f647eac5f33d2778fa535654147234a76b9b4651101687c0e712b64d09f13f2ed1477f74d62640cd769a219da696baf1ebe9
-
Filesize
64KB
MD579a0da84e8d51ca1700f295222a98698
SHA14591e9be3aee12535178f78d2026cfa0b22d1dd2
SHA25691bee37aacf24409478de537bc07ca3aa2b6d3c1b4446b7442fdddcee8b9ec58
SHA5129035bfc5dd395277ab747e88e136ea8c01e64ee24cd8c30490eede6dd26748ef0e639f8c7162f8318f5e46221131522058c5160fa7d8c17497893157baa4cb2c