Analysis
-
max time kernel
52s -
max time network
54s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 08:54
Behavioral task
behavioral1
Sample
078fd014bac4a207444ec7e40d26a0c5_JaffaCakes118.pdf
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
078fd014bac4a207444ec7e40d26a0c5_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
078fd014bac4a207444ec7e40d26a0c5_JaffaCakes118.pdf
-
Size
7KB
-
MD5
078fd014bac4a207444ec7e40d26a0c5
-
SHA1
bc0fcbb3c8a3f6843c74a9ad45e0969d6637f96a
-
SHA256
96795779b9091b1d1af23b7e8c751945561bdab9d3e2726fefc63b8e44df5c40
-
SHA512
266fb7fe465a201bb29fb53f219f2d3ecca232b7f8b961f6787f4b8318168dde40a4d371031af0da27a31864d99d72a06b86a72847229516f0e2e514cb020640
-
SSDEEP
192:4eH18/e/nP10wcS+/kU7LMtfLY/IY6BoaRZ3SNbm+PkKrute1Wtg:4eH18/e/nPrj+/JnsQIC0Z3ebFPkKitu
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4772 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4772 wrote to memory of 3204 4772 AcroRd32.exe 81 PID 4772 wrote to memory of 3204 4772 AcroRd32.exe 81 PID 4772 wrote to memory of 3204 4772 AcroRd32.exe 81 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 696 3204 RdrCEF.exe 82 PID 3204 wrote to memory of 4384 3204 RdrCEF.exe 83 PID 3204 wrote to memory of 4384 3204 RdrCEF.exe 83 PID 3204 wrote to memory of 4384 3204 RdrCEF.exe 83 PID 3204 wrote to memory of 4384 3204 RdrCEF.exe 83 PID 3204 wrote to memory of 4384 3204 RdrCEF.exe 83 PID 3204 wrote to memory of 4384 3204 RdrCEF.exe 83 PID 3204 wrote to memory of 4384 3204 RdrCEF.exe 83 PID 3204 wrote to memory of 4384 3204 RdrCEF.exe 83 PID 3204 wrote to memory of 4384 3204 RdrCEF.exe 83 PID 3204 wrote to memory of 4384 3204 RdrCEF.exe 83 PID 3204 wrote to memory of 4384 3204 RdrCEF.exe 83 PID 3204 wrote to memory of 4384 3204 RdrCEF.exe 83 PID 3204 wrote to memory of 4384 3204 RdrCEF.exe 83 PID 3204 wrote to memory of 4384 3204 RdrCEF.exe 83 PID 3204 wrote to memory of 4384 3204 RdrCEF.exe 83 PID 3204 wrote to memory of 4384 3204 RdrCEF.exe 83 PID 3204 wrote to memory of 4384 3204 RdrCEF.exe 83 PID 3204 wrote to memory of 4384 3204 RdrCEF.exe 83 PID 3204 wrote to memory of 4384 3204 RdrCEF.exe 83 PID 3204 wrote to memory of 4384 3204 RdrCEF.exe 83
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\078fd014bac4a207444ec7e40d26a0c5_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2CBB403F5F98FC3F237C57ADBDB91284 --mojo-platform-channel-handle=1720 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:696
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=D523730E6478688CF5A1CB563C751109 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=D523730E6478688CF5A1CB563C751109 --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:13⤵PID:4384
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BA3D2BAC63105423AD1F37906466C3B2 --mojo-platform-channel-handle=2300 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4776
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FAF790A1DEE9AF852321BB3556293371 --mojo-platform-channel-handle=1928 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1760
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=636F4CCF32E00F6A9EBFDEE46921BF53 --mojo-platform-channel-handle=2312 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4148
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=59602B667E7C3E279F66F92B7532F692 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=59602B667E7C3E279F66F92B7532F692 --renderer-client-id=7 --mojo-platform-channel-handle=2512 --allow-no-sandbox-job /prefetch:13⤵PID:3312
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD55854ba8abd28b1d709414159ac4377ee
SHA1a10f15b5df8a54ebbd60810af2fc85fc6d72c053
SHA2564be7915479894262d5879461632c181e8ff9ca959b77c1d452eb580343ecd753
SHA512a72df731158b1b313723a8e15f956e9ce764f809a234d923f8946c2318dcf2f804f42a2ec0d0198a7f4c15911dc0eac374009ba91dada7b4bb15de1cb4b30ac5