Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-06-2024 20:30
Behavioral task
behavioral1
Sample
0ab30711f16fb7627b7f2a1eeeb6d957_JaffaCakes118.pdf
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0ab30711f16fb7627b7f2a1eeeb6d957_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
0ab30711f16fb7627b7f2a1eeeb6d957_JaffaCakes118.pdf
-
Size
86KB
-
MD5
0ab30711f16fb7627b7f2a1eeeb6d957
-
SHA1
5326687ba11b6f5452bc2226816708ef0789bdda
-
SHA256
606d0d249bb2097b6323f3170dbc929a0b90a63a37bca80ec1a0e6e83702f1a6
-
SHA512
0aee7dd20f2e490b46f29f15eb894c791dbdd88927f0aa343c2a77539a464ba5327d336b5cbbd3b461f22ebafd09b3e9bac08b14ab65be8c6ba7a04ac425f398
-
SSDEEP
1536:kcen7iVuSwro5WmMA4ibjqDfOsYM2StKDkWwt4bvDQUrweWUpO7bgs:q+VudzFibji11KDjvDJwJ77
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3224 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3224 AcroRd32.exe 3224 AcroRd32.exe 3224 AcroRd32.exe 3224 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3224 wrote to memory of 4232 3224 AcroRd32.exe 83 PID 3224 wrote to memory of 4232 3224 AcroRd32.exe 83 PID 3224 wrote to memory of 4232 3224 AcroRd32.exe 83 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 872 4232 RdrCEF.exe 85 PID 4232 wrote to memory of 2076 4232 RdrCEF.exe 86 PID 4232 wrote to memory of 2076 4232 RdrCEF.exe 86 PID 4232 wrote to memory of 2076 4232 RdrCEF.exe 86 PID 4232 wrote to memory of 2076 4232 RdrCEF.exe 86 PID 4232 wrote to memory of 2076 4232 RdrCEF.exe 86 PID 4232 wrote to memory of 2076 4232 RdrCEF.exe 86 PID 4232 wrote to memory of 2076 4232 RdrCEF.exe 86 PID 4232 wrote to memory of 2076 4232 RdrCEF.exe 86 PID 4232 wrote to memory of 2076 4232 RdrCEF.exe 86 PID 4232 wrote to memory of 2076 4232 RdrCEF.exe 86 PID 4232 wrote to memory of 2076 4232 RdrCEF.exe 86 PID 4232 wrote to memory of 2076 4232 RdrCEF.exe 86 PID 4232 wrote to memory of 2076 4232 RdrCEF.exe 86 PID 4232 wrote to memory of 2076 4232 RdrCEF.exe 86 PID 4232 wrote to memory of 2076 4232 RdrCEF.exe 86 PID 4232 wrote to memory of 2076 4232 RdrCEF.exe 86 PID 4232 wrote to memory of 2076 4232 RdrCEF.exe 86 PID 4232 wrote to memory of 2076 4232 RdrCEF.exe 86 PID 4232 wrote to memory of 2076 4232 RdrCEF.exe 86 PID 4232 wrote to memory of 2076 4232 RdrCEF.exe 86
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0ab30711f16fb7627b7f2a1eeeb6d957_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E5B1AB067B1A89D7B2DCC00A6A7B2F4F --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:872
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=6C490D552325FDB3E3967D1A59697BE3 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=6C490D552325FDB3E3967D1A59697BE3 --renderer-client-id=2 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job /prefetch:13⤵PID:2076
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3431BE5E7EA1EA72F81216538DC336B9 --mojo-platform-channel-handle=2312 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2316
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=FBF9186C10B4630CBDBEB20753D803F3 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=FBF9186C10B4630CBDBEB20753D803F3 --renderer-client-id=5 --mojo-platform-channel-handle=2324 --allow-no-sandbox-job /prefetch:13⤵PID:4880
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=ED26DF0C129DC547E144DC66BBF419CA --mojo-platform-channel-handle=2768 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2164
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=81461A1EDC3573A349A8B08311FFDBB4 --mojo-platform-channel-handle=2328 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4852
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5419ec82b38efbace500204bd346d16cf
SHA1e1be5d79e8f510be29fea30bd63458ac62617387
SHA25646c2494d88c0c3c2d344ba88defc8bbf2eb069d16d991be13a27bca20cc761d8
SHA5128123800da72bc646c1a4bf3986d24bf8d0b75c9d92c557ce0ce6822daa3a40a1f7ae7536a57e72a45c8969daddd06bab1218d0c468ffa0ad545f7e1e056a8e91
-
Filesize
64KB
MD555636707fe94af43e6a2e0cc11233332
SHA1c4dd318a81db4370585ee84be5a327978bd063d0
SHA256c42112479b3773702d0a36d608668b9493c0703a29bdfc19c9c67358bcfb483e
SHA5121b1a25ffafbd8b0a8903b542d036bcf7606bd30f6b0619ec28be78f5328321910ccd7bf8d7f0bb229718b9b15e58cc21cd0cbdd3ed29685b9301b10e0f4ac568