Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 23:32
Behavioral task
behavioral1
Sample
a71ee5d30a558196d510c1ef5fb7cbe8_JaffaCakes118.pdf
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
a71ee5d30a558196d510c1ef5fb7cbe8_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
a71ee5d30a558196d510c1ef5fb7cbe8_JaffaCakes118.pdf
-
Size
45KB
-
MD5
a71ee5d30a558196d510c1ef5fb7cbe8
-
SHA1
60af84213a09ac3b3d11849861d78364ad196a1b
-
SHA256
78fa0c385c6ed4f4f0a2b23a0124864b3b6bc8a9dacc2935d2997115e3d652c2
-
SHA512
97c5d5d9a3d7d14e3fe965834ca6d419925a65fc1db36cb6a5bf68abc0af8b2c48494bd467ca00aaea9afbbde9806f9bf32c660f9a33fff6e313a25a7824f290
-
SSDEEP
768:ZgGzpDcKMTcQILNXMnlwIDxv2tT6gV/hvbb4mjVopVLS020rCzeyQlkPNfedVf:aGFIZv2cgn/zophS020eblWdVf
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 2056 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 2056 AcroRd32.exe 2056 AcroRd32.exe 2056 AcroRd32.exe 2056 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 2056 wrote to memory of 4684 2056 AcroRd32.exe RdrCEF.exe PID 2056 wrote to memory of 4684 2056 AcroRd32.exe RdrCEF.exe PID 2056 wrote to memory of 4684 2056 AcroRd32.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4524 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4392 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4392 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4392 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4392 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4392 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4392 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4392 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4392 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4392 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4392 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4392 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4392 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4392 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4392 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4392 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4392 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4392 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4392 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4392 4684 RdrCEF.exe RdrCEF.exe PID 4684 wrote to memory of 4392 4684 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a71ee5d30a558196d510c1ef5fb7cbe8_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3F313F5E82EB320D4D6DF4BF9E655006 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=5B52C0B74DFE18EE0223283CDD74F3B1 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=5B52C0B74DFE18EE0223283CDD74F3B1 --renderer-client-id=2 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9E39279F0FE284A5F410B5940B490958 --mojo-platform-channel-handle=2288 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=89C5DDF033077AB50076ADEFE1D9D2C2 --mojo-platform-channel-handle=2308 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7C3FA7B4B7BF832BE5472080B1C73A44 --mojo-platform-channel-handle=2292 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=1FA243534F7466137A196F5DE8B11A90 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=1FA243534F7466137A196F5DE8B11A90 --renderer-client-id=7 --mojo-platform-channel-handle=2344 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessagesFilesize
64KB
MD5e047b5e1568d748ba087bc43d1929925
SHA1a299eea149c1de74b1f25d544d987547e59be755
SHA256734c0de0f8356cbe5b19b68fc53c267c8b5658bcf9ffcea4a14fa6d3b5d7c1d4
SHA51249391c06a307c461c06bfe5e28024c46fa69076b2cd7b24a625e4283ac7a76a8a068e6dc7a64579a2bc7dacd3d91f21d019c3f4e0551790db9806235689aaa8a