Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15-06-2024 07:17
Behavioral task
behavioral1
Sample
ad4bbb8ff9014b14f6a678885e5cb571_JaffaCakes118.pdf
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ad4bbb8ff9014b14f6a678885e5cb571_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
ad4bbb8ff9014b14f6a678885e5cb571_JaffaCakes118.pdf
-
Size
182KB
-
MD5
ad4bbb8ff9014b14f6a678885e5cb571
-
SHA1
32cbb089ff374042100d2a1b5fac9d98cc787044
-
SHA256
2142600ee7a5eced9eb6745e694e7124b7670df9f63feb0f78383aea62171c0d
-
SHA512
6b6c3b582083a62f35b25164a9501fa49c0184936941262c7794651f3a09c036fde9ede698b9bdf0c9fdef6ac02b87a5018c1e3837d12b2dc94c63ae266f11c2
-
SSDEEP
3072:K2irbxzGAFYDMxud7fKg3dXVmbOn5ui6Kjnz/pIbZtLJXggc8puW9SqSm:K2MKlWQ7Sg3d4bOrVI9tVQC
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3952 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3952 AcroRd32.exe 3952 AcroRd32.exe 3952 AcroRd32.exe 3952 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3952 wrote to memory of 2364 3952 AcroRd32.exe 85 PID 3952 wrote to memory of 2364 3952 AcroRd32.exe 85 PID 3952 wrote to memory of 2364 3952 AcroRd32.exe 85 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 3876 2364 RdrCEF.exe 86 PID 2364 wrote to memory of 1904 2364 RdrCEF.exe 87 PID 2364 wrote to memory of 1904 2364 RdrCEF.exe 87 PID 2364 wrote to memory of 1904 2364 RdrCEF.exe 87 PID 2364 wrote to memory of 1904 2364 RdrCEF.exe 87 PID 2364 wrote to memory of 1904 2364 RdrCEF.exe 87 PID 2364 wrote to memory of 1904 2364 RdrCEF.exe 87 PID 2364 wrote to memory of 1904 2364 RdrCEF.exe 87 PID 2364 wrote to memory of 1904 2364 RdrCEF.exe 87 PID 2364 wrote to memory of 1904 2364 RdrCEF.exe 87 PID 2364 wrote to memory of 1904 2364 RdrCEF.exe 87 PID 2364 wrote to memory of 1904 2364 RdrCEF.exe 87 PID 2364 wrote to memory of 1904 2364 RdrCEF.exe 87 PID 2364 wrote to memory of 1904 2364 RdrCEF.exe 87 PID 2364 wrote to memory of 1904 2364 RdrCEF.exe 87 PID 2364 wrote to memory of 1904 2364 RdrCEF.exe 87 PID 2364 wrote to memory of 1904 2364 RdrCEF.exe 87 PID 2364 wrote to memory of 1904 2364 RdrCEF.exe 87 PID 2364 wrote to memory of 1904 2364 RdrCEF.exe 87 PID 2364 wrote to memory of 1904 2364 RdrCEF.exe 87 PID 2364 wrote to memory of 1904 2364 RdrCEF.exe 87
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ad4bbb8ff9014b14f6a678885e5cb571_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=088EE51FC785233BCAFFEB2011F8CA10 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3876
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=EA762691EC36EA717E34870655681FB3 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=EA762691EC36EA717E34870655681FB3 --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:13⤵PID:1904
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=39E92513169CB9023B6117735D338DF2 --mojo-platform-channel-handle=2304 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1744
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4782CF458200CB8D85ACA329B232E285 --mojo-platform-channel-handle=2424 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:324
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3FA7732CC57F9E9F5EA5EC037CEC1D58 --mojo-platform-channel-handle=2328 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4072
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=85149E8CE348C9A6D898975343961175 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=85149E8CE348C9A6D898975343961175 --renderer-client-id=7 --mojo-platform-channel-handle=2396 --allow-no-sandbox-job /prefetch:13⤵PID:2960
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5f4b6ac4dbd04fb54c108647983ab015b
SHA146f6b761ea3e1a9daf190786cdbe59d15780cf53
SHA25632e43cc4c15d23081fad20b80b06f24635fbb5a16f060d1696e9c5e8b0d9be16
SHA5124c8acb806aba2144157a3cf0162a3752c593370a25ea86d1ae9f8bfe2d9ec197c61aaf371937647edce8f7538d0008af9ab1f18fb6346db68f2ac2e474c37132