Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 13:03
Behavioral task
behavioral1
Sample
a5ac23019a00f086218d52f06a9979a4_JaffaCakes118.pdf
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a5ac23019a00f086218d52f06a9979a4_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
a5ac23019a00f086218d52f06a9979a4_JaffaCakes118.pdf
-
Size
37KB
-
MD5
a5ac23019a00f086218d52f06a9979a4
-
SHA1
1580ecd7b978eb37a065fbb06846fab76a318b49
-
SHA256
51d4bc3e1e0d4614c503931439497eb0e3052c5e8f0b4b4b29235448030e19d0
-
SHA512
080f74acd4c090717d241096aac75b829e9d015a8542312596157fefaedf8b47262d666d77a4425aa73a354cb6ed28de9872e4429f1f92f9f30084cb1622fada
-
SSDEEP
768:GJiQGzPXour39XBmXWD1GcspVYmUUCG+Soa/jVnsmb4scvFv5tyFXJUU:YJGzPXR3MlUUtoaLZsbfR5tQGU
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 3672 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 3672 AcroRd32.exe 3672 AcroRd32.exe 3672 AcroRd32.exe 3672 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 3672 wrote to memory of 212 3672 AcroRd32.exe RdrCEF.exe PID 3672 wrote to memory of 212 3672 AcroRd32.exe RdrCEF.exe PID 3672 wrote to memory of 212 3672 AcroRd32.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 4168 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 1496 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 1496 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 1496 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 1496 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 1496 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 1496 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 1496 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 1496 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 1496 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 1496 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 1496 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 1496 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 1496 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 1496 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 1496 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 1496 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 1496 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 1496 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 1496 212 RdrCEF.exe RdrCEF.exe PID 212 wrote to memory of 1496 212 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a5ac23019a00f086218d52f06a9979a4_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1FEEAE5EDEE5EFA8B5B6D5BF8781BBB7 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=B3203EED59206FA4573D142A87813525 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=B3203EED59206FA4573D142A87813525 --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3BC075C56F4B32D3C1973635CE013846 --mojo-platform-channel-handle=2300 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=AC718D5F19815A9ED1FA94CB4D43D097 --mojo-platform-channel-handle=1916 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=89AD90E2D981D1E9648F475BCB670614 --mojo-platform-channel-handle=2436 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=9EDA7A7426EFA79E57FC50CFD494EC90 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=9EDA7A7426EFA79E57FC50CFD494EC90 --renderer-client-id=7 --mojo-platform-channel-handle=2332 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessagesFilesize
64KB
MD50504d0dfce192ff18efab94abb321d77
SHA1233997bfe161df6dd27b88cb34f3c92259fdddc3
SHA25606e9ae18b1965904f6be1439728717da77b0b2e387dc5b54a5c22876a69c20bb
SHA512db8abc476eee3bea437b3429a106bc1d3fb743be83bc0a769eb8972c68e5bc725ee33d1617fe312650fd5e1eec14eeeb12b87a7373edf9d889d74d894d9fa122