Analysis
-
max time kernel
128s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 21:15
Behavioral task
behavioral1
Sample
1c85b48caa0804cc2b24eb33c4f279bd_JaffaCakes118.pdf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1c85b48caa0804cc2b24eb33c4f279bd_JaffaCakes118.pdf
Resource
win10v2004-20240226-en
General
-
Target
1c85b48caa0804cc2b24eb33c4f279bd_JaffaCakes118.pdf
-
Size
79KB
-
MD5
1c85b48caa0804cc2b24eb33c4f279bd
-
SHA1
b7cc66670d6e5cd8505702abf0f92427612a89a7
-
SHA256
8533a5255daae702944d6a63b1406e9b4e149a1316d30c264df193cd017a7ff5
-
SHA512
90ac2279a251b42676d0cc16dc92ac0d7c41a7e6fe25e0b765f7ec858a72f4f12ebe138ed8c0243f7e40e0d2d5fb9571ad7be2a00369eefcef31cafac1a1d94c
-
SSDEEP
1536:6D3I9su0laYiPsVji4N0Qmbi1e5PSMCtIxz+lINxvW3ZR6VO:k3I9sFYYrVji4Lmbi1e9ViINU3ZD
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4048 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4048 AcroRd32.exe 4048 AcroRd32.exe 4048 AcroRd32.exe 4048 AcroRd32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4048 wrote to memory of 4548 4048 AcroRd32.exe 101 PID 4048 wrote to memory of 4548 4048 AcroRd32.exe 101 PID 4048 wrote to memory of 4548 4048 AcroRd32.exe 101 PID 4048 wrote to memory of 4260 4048 AcroRd32.exe 102 PID 4048 wrote to memory of 4260 4048 AcroRd32.exe 102 PID 4048 wrote to memory of 4260 4048 AcroRd32.exe 102
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1c85b48caa0804cc2b24eb33c4f279bd_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:4548
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:4260
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:3124
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4048 --field-trial-handle=2248,i,10247514684337323751,15511974759131734137,262144 --variations-seed-version /prefetch:81⤵PID:1072