Analysis
-
max time kernel
52s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 22:02
Behavioral task
behavioral1
Sample
9c1500a5054f898c50515dfc423c9942_JaffaCakes118.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9c1500a5054f898c50515dfc423c9942_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
9c1500a5054f898c50515dfc423c9942_JaffaCakes118.pdf
-
Size
59KB
-
MD5
9c1500a5054f898c50515dfc423c9942
-
SHA1
d6dec51c31c3188262224b8b4b5b7179892acbb1
-
SHA256
49b65380051854cd797556c771690215a24519f2c11e47b8ba95ec8029ab4b6a
-
SHA512
5c3d4013716ae34c54264bd326e0f619f1c7ac4f0cdae793449dbc414682819617888902e9c91a3ab8f4ac7ddf2cfc7206adce51454203edac4e75df3bb06e01
-
SSDEEP
1536:/GFVo3LeV+MV52KrMyWDkNGGreFKYl2nSvScZadpsb:uFV6s12KdkweFKYUSLodq
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4128 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4128 AcroRd32.exe 4128 AcroRd32.exe 4128 AcroRd32.exe 4128 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4128 wrote to memory of 2564 4128 AcroRd32.exe 84 PID 4128 wrote to memory of 2564 4128 AcroRd32.exe 84 PID 4128 wrote to memory of 2564 4128 AcroRd32.exe 84 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 4676 2564 RdrCEF.exe 85 PID 2564 wrote to memory of 3548 2564 RdrCEF.exe 86 PID 2564 wrote to memory of 3548 2564 RdrCEF.exe 86 PID 2564 wrote to memory of 3548 2564 RdrCEF.exe 86 PID 2564 wrote to memory of 3548 2564 RdrCEF.exe 86 PID 2564 wrote to memory of 3548 2564 RdrCEF.exe 86 PID 2564 wrote to memory of 3548 2564 RdrCEF.exe 86 PID 2564 wrote to memory of 3548 2564 RdrCEF.exe 86 PID 2564 wrote to memory of 3548 2564 RdrCEF.exe 86 PID 2564 wrote to memory of 3548 2564 RdrCEF.exe 86 PID 2564 wrote to memory of 3548 2564 RdrCEF.exe 86 PID 2564 wrote to memory of 3548 2564 RdrCEF.exe 86 PID 2564 wrote to memory of 3548 2564 RdrCEF.exe 86 PID 2564 wrote to memory of 3548 2564 RdrCEF.exe 86 PID 2564 wrote to memory of 3548 2564 RdrCEF.exe 86 PID 2564 wrote to memory of 3548 2564 RdrCEF.exe 86 PID 2564 wrote to memory of 3548 2564 RdrCEF.exe 86 PID 2564 wrote to memory of 3548 2564 RdrCEF.exe 86 PID 2564 wrote to memory of 3548 2564 RdrCEF.exe 86 PID 2564 wrote to memory of 3548 2564 RdrCEF.exe 86 PID 2564 wrote to memory of 3548 2564 RdrCEF.exe 86
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\9c1500a5054f898c50515dfc423c9942_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E110FB3597466ECE8A3A158D190FFC85 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4676
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=6037F1C7293E85CE565EBEEFF1357540 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=6037F1C7293E85CE565EBEEFF1357540 --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:13⤵PID:3548
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=55AA387188C73FF4E7987A9E0EAA82A5 --mojo-platform-channel-handle=2288 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2376
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=309E2E89E3A7D7D9888FAA26834423FA --mojo-platform-channel-handle=1804 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2280
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C71D68F443AF53F6CAD02874BD024C2C --mojo-platform-channel-handle=2320 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:880
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=B5B5F4699FF76E42FF6D90427C9706E0 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=B5B5F4699FF76E42FF6D90427C9706E0 --renderer-client-id=7 --mojo-platform-channel-handle=2420 --allow-no-sandbox-job /prefetch:13⤵PID:212
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD551b2aee5c74a1eae9df52e1bc0f1b9d8
SHA1417fcad289f38cd70fe1029fce0caff8bb75e90d
SHA256f403af9990d876471ed214f694c89e4cd3497d88081a404ed867ef84cf6ab0ac
SHA512a2c3b5c1fef1a9a3d2e5db964f84c328423d18aa94fbf63a7fb1373c9e7b396ceab17d7b2860b2d6dab801af5ecfc1f33e6a1079e9b5a70ce4110fa88da88058