Analysis
-
max time kernel
133s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 15:36
Behavioral task
behavioral1
Sample
9883bd0930a28537789027c4edcedec2_JaffaCakes118.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9883bd0930a28537789027c4edcedec2_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
9883bd0930a28537789027c4edcedec2_JaffaCakes118.pdf
-
Size
51KB
-
MD5
9883bd0930a28537789027c4edcedec2
-
SHA1
e294990ad98c43b7f393a147b06b3a10cc2c8260
-
SHA256
46d202e9ee1818bead3389f7b086e0810416641d921239302bbfceb982dc796c
-
SHA512
90e3174b109cc24d4087c0ab1ab69e0612013ceea92359abecabbcf41f77fff6cc2d0466349f07398e726289819df071236043fd2a14035bc61766246fbf7aa7
-
SSDEEP
1536:TGF7pThRJSJu96Xw+3VuqtTF47Eie9SniRNBFIyfRWm:iF7pd+JK6A+3oqo7je9ScIyfV
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4220 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4220 AcroRd32.exe 4220 AcroRd32.exe 4220 AcroRd32.exe 4220 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4220 wrote to memory of 64 4220 AcroRd32.exe 91 PID 4220 wrote to memory of 64 4220 AcroRd32.exe 91 PID 4220 wrote to memory of 64 4220 AcroRd32.exe 91 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 1616 64 RdrCEF.exe 94 PID 64 wrote to memory of 2348 64 RdrCEF.exe 95 PID 64 wrote to memory of 2348 64 RdrCEF.exe 95 PID 64 wrote to memory of 2348 64 RdrCEF.exe 95 PID 64 wrote to memory of 2348 64 RdrCEF.exe 95 PID 64 wrote to memory of 2348 64 RdrCEF.exe 95 PID 64 wrote to memory of 2348 64 RdrCEF.exe 95 PID 64 wrote to memory of 2348 64 RdrCEF.exe 95 PID 64 wrote to memory of 2348 64 RdrCEF.exe 95 PID 64 wrote to memory of 2348 64 RdrCEF.exe 95 PID 64 wrote to memory of 2348 64 RdrCEF.exe 95 PID 64 wrote to memory of 2348 64 RdrCEF.exe 95 PID 64 wrote to memory of 2348 64 RdrCEF.exe 95 PID 64 wrote to memory of 2348 64 RdrCEF.exe 95 PID 64 wrote to memory of 2348 64 RdrCEF.exe 95 PID 64 wrote to memory of 2348 64 RdrCEF.exe 95 PID 64 wrote to memory of 2348 64 RdrCEF.exe 95 PID 64 wrote to memory of 2348 64 RdrCEF.exe 95 PID 64 wrote to memory of 2348 64 RdrCEF.exe 95 PID 64 wrote to memory of 2348 64 RdrCEF.exe 95 PID 64 wrote to memory of 2348 64 RdrCEF.exe 95
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\9883bd0930a28537789027c4edcedec2_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9CF24958B38B948401DCF74286B4ACBF --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1616
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=E6555799A52358E65B836B52C86A75D3 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=E6555799A52358E65B836B52C86A75D3 --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:13⤵PID:2348
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E74AE54CFBAEB4C0BDB3E8F74F31A1A7 --mojo-platform-channel-handle=2308 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2876
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7D3F17E963B6C9274D71748FEFCE19A3 --mojo-platform-channel-handle=1956 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4104
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=89F21A630FB4FD2332E06C0BD8CDC290 --mojo-platform-channel-handle=2568 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4976
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=1BCBD33C40FD4130A42A3C5D6275D616 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=1BCBD33C40FD4130A42A3C5D6275D616 --renderer-client-id=7 --mojo-platform-channel-handle=2584 --allow-no-sandbox-job /prefetch:13⤵PID:2744
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD58069d2d33b20e7b199129fba29d9807f
SHA18c72c97388472a45bcc92a3408543486995de415
SHA256f41889dd85c54b7dae83dbb66af83136ffba3f5698611cfb44016e1b84510b31
SHA51258ac350a90b33bff11cf26815c422680ced5cfe4b89bd06b60a9dc14de373c725193f6d9e0e81544d173ff5a5d80f96ea6ac803e6c99e8d98f9b43b39a094b61
-
Filesize
64KB
MD59f020921da7e788349261b86f7756458
SHA1f3ac68d430e3f9a822e3009bf66ee0ba7ee131c7
SHA25665c12227b307da72edb9e5fe8cb184db40f795fa37023689c490e81c8ac4c772
SHA51218b77a38767d7b45508b1e2612164ca6afce865d043401988afe3eb190239959a877cbb27913182296021eb157281cbb03d0433b99b0b7689230d81330d3777a