Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 09:12
Behavioral task
behavioral1
Sample
07a32fc69fac165a99d4d34959c7ffc6_JaffaCakes118.pdf
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
07a32fc69fac165a99d4d34959c7ffc6_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
07a32fc69fac165a99d4d34959c7ffc6_JaffaCakes118.pdf
-
Size
11KB
-
MD5
07a32fc69fac165a99d4d34959c7ffc6
-
SHA1
5de9a7b7a742fc34ee44cfe545dae04dd4e1eaa7
-
SHA256
c74a93230b430638cde150a6590ab6dbab2cfdbb1142f494fcf1d74beec3e331
-
SHA512
fb4376e6c33404c0f4e2d03abdfbf18e9bed36abb4d609b676b14f7998c645e07fd7ce7d56da2d1015e4f6d3aa01e399e1745458760bbfe950c7da10bfa5c2ff
-
SSDEEP
192:gPz4ULMxLIKXHw08nTcZcDLHZW2/bli6pI2EzPbeYk/+14XpL+tsz1YdkvtolZiO:gPz4ULMxLIKXHw08ccDlWiRp1WPiYk/q
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
AcroRd32.exepid process 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 4420 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AcroRd32.exepid process 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe 4420 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 4420 wrote to memory of 3912 4420 AcroRd32.exe RdrCEF.exe PID 4420 wrote to memory of 3912 4420 AcroRd32.exe RdrCEF.exe PID 4420 wrote to memory of 3912 4420 AcroRd32.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1152 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1196 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1196 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1196 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1196 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1196 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1196 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1196 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1196 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1196 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1196 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1196 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1196 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1196 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1196 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1196 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1196 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1196 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1196 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1196 3912 RdrCEF.exe RdrCEF.exe PID 3912 wrote to memory of 1196 3912 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\07a32fc69fac165a99d4d34959c7ffc6_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=13C6743A7A1CB765FF3BBEA5F6A03DC1 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1152
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=2BC96A1865BCB6C3141DF62539C1F0D9 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=2BC96A1865BCB6C3141DF62539C1F0D9 --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:13⤵PID:1196
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B7815DEEDE352B597EBF7D986FB66420 --mojo-platform-channel-handle=2288 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2216
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=40D512AD3E62676057F137DC3F0FBF93 --mojo-platform-channel-handle=2408 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:768
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=976F3D05EA7C623D603B02550D1E1196 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=976F3D05EA7C623D603B02550D1E1196 --renderer-client-id=6 --mojo-platform-channel-handle=2312 --allow-no-sandbox-job /prefetch:13⤵PID:1788
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5A1B46EB4DEB51E6E714CCF8E2866B25 --mojo-platform-channel-handle=2676 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2328
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5f15efcac07bb5f4ff4bc33aa5fbd0c55
SHA15cdcb01506429410839ec4ead8c62a43cb306013
SHA256a12e32b890e6c3a8d59dbf10559ac61770e21b7e76074406cb637398181cea9c
SHA5120f4f9ff762ff37dd3271131ee5a0154c351a6ed3020e0c72a0f32f41abff5b9bc6c4ae050eb4bf2aaca952f6fcbd1926e01e063dcfcd0a3d5279570e6f17df94
-
Filesize
64KB
MD58db798581170c86afb0545d070c09427
SHA16fb1d4bde9e7db7ccb8514bf949cb6fba765c985
SHA256c0b10babf3edf2c2b9ed1e25c284f2bf822394903316b92f535ec1a28fd0635f
SHA512808c0851d71a2581a133aa045ab3e7d08f94430b46165e79d325f11604574e7a544154f77f6cad4fdb80dfd8985735d5e3c09829466d000bb3e7baf61420dc49