Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 16:20
Behavioral task
behavioral1
Sample
07af26c613439b0144f278a11c36f3b4_JaffaCakes118.pdf
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
07af26c613439b0144f278a11c36f3b4_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
07af26c613439b0144f278a11c36f3b4_JaffaCakes118.pdf
-
Size
12KB
-
MD5
07af26c613439b0144f278a11c36f3b4
-
SHA1
1fd9565354df2522f4a6a4293557a318a12332af
-
SHA256
cb3aa2cea0c4cb2a027f68d7b6343160f5e4ffe7f562a7a4afc5de6824fb49d5
-
SHA512
b2a4cf1cfd7c650e10a2e81f44a284acbc7705672e275003cb58ef71a51f7ee7e886d62007f2a478cdf4516a8d098752bdc4bad2b30fcca211d03f0fb409ef80
-
SSDEEP
384:DLEMMLEtysylRmjCyiQwC4yiQwCgwdihqi1Kd98pRPFOF++:Dg/gyyCyBw5yBw/4iG3
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 624 AcroRd32.exe 624 AcroRd32.exe 624 AcroRd32.exe 624 AcroRd32.exe 624 AcroRd32.exe 624 AcroRd32.exe 624 AcroRd32.exe 624 AcroRd32.exe 624 AcroRd32.exe 624 AcroRd32.exe 624 AcroRd32.exe 624 AcroRd32.exe 624 AcroRd32.exe 624 AcroRd32.exe 624 AcroRd32.exe 624 AcroRd32.exe 624 AcroRd32.exe 624 AcroRd32.exe 624 AcroRd32.exe 624 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 624 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 624 AcroRd32.exe 624 AcroRd32.exe 624 AcroRd32.exe 624 AcroRd32.exe 624 AcroRd32.exe 624 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 624 wrote to memory of 3232 624 AcroRd32.exe 89 PID 624 wrote to memory of 3232 624 AcroRd32.exe 89 PID 624 wrote to memory of 3232 624 AcroRd32.exe 89 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 4904 3232 RdrCEF.exe 90 PID 3232 wrote to memory of 3056 3232 RdrCEF.exe 91 PID 3232 wrote to memory of 3056 3232 RdrCEF.exe 91 PID 3232 wrote to memory of 3056 3232 RdrCEF.exe 91 PID 3232 wrote to memory of 3056 3232 RdrCEF.exe 91 PID 3232 wrote to memory of 3056 3232 RdrCEF.exe 91 PID 3232 wrote to memory of 3056 3232 RdrCEF.exe 91 PID 3232 wrote to memory of 3056 3232 RdrCEF.exe 91 PID 3232 wrote to memory of 3056 3232 RdrCEF.exe 91 PID 3232 wrote to memory of 3056 3232 RdrCEF.exe 91 PID 3232 wrote to memory of 3056 3232 RdrCEF.exe 91 PID 3232 wrote to memory of 3056 3232 RdrCEF.exe 91 PID 3232 wrote to memory of 3056 3232 RdrCEF.exe 91 PID 3232 wrote to memory of 3056 3232 RdrCEF.exe 91 PID 3232 wrote to memory of 3056 3232 RdrCEF.exe 91 PID 3232 wrote to memory of 3056 3232 RdrCEF.exe 91 PID 3232 wrote to memory of 3056 3232 RdrCEF.exe 91 PID 3232 wrote to memory of 3056 3232 RdrCEF.exe 91 PID 3232 wrote to memory of 3056 3232 RdrCEF.exe 91 PID 3232 wrote to memory of 3056 3232 RdrCEF.exe 91 PID 3232 wrote to memory of 3056 3232 RdrCEF.exe 91
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\07af26c613439b0144f278a11c36f3b4_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A8963BCEDCF6402B8A9407EC8C65025F --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4904
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=D91AE29650EFECD312FAC5D70EB67147 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=D91AE29650EFECD312FAC5D70EB67147 --renderer-client-id=2 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job /prefetch:13⤵PID:3056
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FE175E8FF28733A8F8EEE748B6877B41 --mojo-platform-channel-handle=2288 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3292
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8EA95742C0EFD34C6C17F8D33D63B63A --mojo-platform-channel-handle=1940 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4924
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=EBD2847849A92411067C317E414C38E7 --mojo-platform-channel-handle=2432 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2372
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=46DC046D5D24115B3F8A8E1FE0DB38F1 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=46DC046D5D24115B3F8A8E1FE0DB38F1 --renderer-client-id=7 --mojo-platform-channel-handle=1928 --allow-no-sandbox-job /prefetch:13⤵PID:1368
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD541ff744511b5651ccf74f60803d2c2ad
SHA184c02f4a09d3af557ecb03f0b77666f7f72cd5ba
SHA256135dbd6b207481b7e4d8d59064562f48fb9d437e400986368332fd1645f9dea2
SHA51230c71d87ce260a5bd613f238b891e81a7aca6acc7547e67bf80719a835efcfd57128041f0ce315502f6c5b7514a06d3b87bd0bca5d67781b317f6a820c966437
-
Filesize
64KB
MD529c0bae3b0fafe2750f0c01f5a39462d
SHA177c7d4b2f2284931ea1d8492d5f8fd354747ab9e
SHA256b81a1d5652b54e705b3cafb893677b098baff03f24a04b8623323dff7ed6d78b
SHA5128dcb142c8224e5a2d133853b71286f2d18e404d5e6009386dff539072791df601264dc46bf560b60627d85ca6f5669f4d87967e5e9464e182b685935b31b2d85