Analysis
-
max time kernel
141s -
max time network
57s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 12:57
Behavioral task
behavioral1
Sample
08a3980af6db19c33cfc4b519f19dc7d_JaffaCakes118.pdf
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
08a3980af6db19c33cfc4b519f19dc7d_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
08a3980af6db19c33cfc4b519f19dc7d_JaffaCakes118.pdf
-
Size
9KB
-
MD5
08a3980af6db19c33cfc4b519f19dc7d
-
SHA1
721827eed6786d659384a46fc79259475aa5179b
-
SHA256
556555264cb1732d60d7d79dfdf62976c1dcd305b674f6ef17822886d7b287bc
-
SHA512
dbf9241376f40360abaac3976f65893cbe4be39c9956b96f322b213fa6dec8c7f24207a7b361ce8dfcb8b4ac033c99fef9e6d0d41a20de5d4c0eb52bb412d63d
-
SSDEEP
192:+Pz4ULMxLIKXHsfyxQTTb1BUpmEOaHiopHjlCIqw+Sv9nm4T+jV6iYoA1ayZY6ew:+Pz4ULMxLIKXHsfC6b12fnHiMHjlCzS/
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
AcroRd32.exepid process 216 AcroRd32.exe 216 AcroRd32.exe 216 AcroRd32.exe 216 AcroRd32.exe 216 AcroRd32.exe 216 AcroRd32.exe 216 AcroRd32.exe 216 AcroRd32.exe 216 AcroRd32.exe 216 AcroRd32.exe 216 AcroRd32.exe 216 AcroRd32.exe 216 AcroRd32.exe 216 AcroRd32.exe 216 AcroRd32.exe 216 AcroRd32.exe 216 AcroRd32.exe 216 AcroRd32.exe 216 AcroRd32.exe 216 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 216 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AcroRd32.exepid process 216 AcroRd32.exe 216 AcroRd32.exe 216 AcroRd32.exe 216 AcroRd32.exe 216 AcroRd32.exe 216 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 216 wrote to memory of 3208 216 AcroRd32.exe RdrCEF.exe PID 216 wrote to memory of 3208 216 AcroRd32.exe RdrCEF.exe PID 216 wrote to memory of 3208 216 AcroRd32.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 3780 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 4956 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 4956 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 4956 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 4956 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 4956 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 4956 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 4956 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 4956 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 4956 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 4956 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 4956 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 4956 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 4956 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 4956 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 4956 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 4956 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 4956 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 4956 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 4956 3208 RdrCEF.exe RdrCEF.exe PID 3208 wrote to memory of 4956 3208 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\08a3980af6db19c33cfc4b519f19dc7d_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FE515FD6B5266D15A41F3FAC5AA96DE1 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3780
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=6C0C97F357FB5F9ACFAA1DFADEF6468F --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=6C0C97F357FB5F9ACFAA1DFADEF6468F --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:13⤵PID:4956
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D6E85046A895AA4C9A638F992416B831 --mojo-platform-channel-handle=2308 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4664
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C6C20E86BF5F1FFE17E3B165C7E9CEBB --mojo-platform-channel-handle=1768 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3960
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=63198C7FDFB09C85E07FE906C780C9E9 --mojo-platform-channel-handle=2420 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1692
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=96D28AF3BDB44615C3B34A0A6DFF023E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=96D28AF3BDB44615C3B34A0A6DFF023E --renderer-client-id=7 --mojo-platform-channel-handle=2340 --allow-no-sandbox-job /prefetch:13⤵PID:4796
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD527e8460f8af68fa81b9cd11e2bb8d026
SHA179b030cbd68233122c09234c5a14b802e87d483b
SHA25630a967da68a7174f951fe1663568b74fed3485b17d4049224b8b2de1674ec6c2
SHA51262a86a4df7aea365b1aeef8b7864d17775aa3133903ccd0576261a4bbeac5ae1566a7d40ae7bd531acc03052ebf629c824ee05ac692da3a00df52caf33265e5f