Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 05:02
Behavioral task
behavioral1
Sample
2127fa352e11adeb0669d8618ce159e1_JaffaCakes118.pdf
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2127fa352e11adeb0669d8618ce159e1_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
2127fa352e11adeb0669d8618ce159e1_JaffaCakes118.pdf
-
Size
9KB
-
MD5
2127fa352e11adeb0669d8618ce159e1
-
SHA1
71a23740480f7d0cd3d15e50d4b9da9303a74ef0
-
SHA256
a4108564836d7f97320d9bf404118393424d248dc87a311d4fe5ec03701299c6
-
SHA512
2e229927bc53a3ff11a98114e124b1aaa5c56bc50d6a6d3d7f60245679acdc4165de8fa19c0ce141470cc37f732b67d2d51253ebd764b8f9e324724d927fea33
-
SSDEEP
192:+jPz4ULMxLIKXHsfyxlDN6I0MWZsAFeMVnI32x4SCvcMbse7YTJphZlndtcokCx:sPz4ULMxLIKXHsfCBN6I0PPFeMVnm2xh
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1612 AcroRd32.exe 1612 AcroRd32.exe 1612 AcroRd32.exe 1612 AcroRd32.exe 1612 AcroRd32.exe 1612 AcroRd32.exe 1612 AcroRd32.exe 1612 AcroRd32.exe 1612 AcroRd32.exe 1612 AcroRd32.exe 1612 AcroRd32.exe 1612 AcroRd32.exe 1612 AcroRd32.exe 1612 AcroRd32.exe 1612 AcroRd32.exe 1612 AcroRd32.exe 1612 AcroRd32.exe 1612 AcroRd32.exe 1612 AcroRd32.exe 1612 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1612 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1612 AcroRd32.exe 1612 AcroRd32.exe 1612 AcroRd32.exe 1612 AcroRd32.exe 1612 AcroRd32.exe 1612 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1612 wrote to memory of 1312 1612 AcroRd32.exe 81 PID 1612 wrote to memory of 1312 1612 AcroRd32.exe 81 PID 1612 wrote to memory of 1312 1612 AcroRd32.exe 81 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 3304 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 2776 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2776 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2776 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2776 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2776 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2776 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2776 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2776 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2776 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2776 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2776 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2776 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2776 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2776 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2776 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2776 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2776 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2776 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2776 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2776 1312 RdrCEF.exe 83
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2127fa352e11adeb0669d8618ce159e1_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=EDC80906176B9BE210C071ED3B381B80 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3304
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=DF60BCDD820AB5FD7D40ACDCF4184202 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=DF60BCDD820AB5FD7D40ACDCF4184202 --renderer-client-id=2 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job /prefetch:13⤵PID:2776
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9670E666AA908234786554D970B5C246 --mojo-platform-channel-handle=2300 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1572
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F31070386334505BBA3EAEB271639EFF --mojo-platform-channel-handle=1932 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1588
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F4B4528BB02488D792256D82C5EDED6F --mojo-platform-channel-handle=2420 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4948
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=1C787A854EA518C4C1EE7497829ECBDD --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=1C787A854EA518C4C1EE7497829ECBDD --renderer-client-id=7 --mojo-platform-channel-handle=1964 --allow-no-sandbox-job /prefetch:13⤵PID:5028
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD54f8e267bd33a1487885e12d602d13ab9
SHA1c7fd167d0ea2becccf9c64017e39e4a4312bb586
SHA2569f83bf97212835976fffac4cc52b9f5d47247eda73cfd79d100ed79eeb3806b5
SHA51201292dd13db8b0da6067f319d792eb83b8513dc7b3a474b1a8756df1fcabeb534e6a026adc05fc69f281217d80a91d6f57cd8bd59f71dcb464c0018a208f1dd4
-
Filesize
64KB
MD5fed1f5eea7e07c37d8764cb2d98b1fd4
SHA17fc1721ce90b8b65eb1cd7059ac21d243434bb31
SHA256522d70261d29b052f9752b6ba28eadcc5c2593eea2621737f440ffad03798762
SHA51226e4d4de2ecf8ba9ab9247f4c1d9fb6818a79b346b5b5b32cfee17d90542476e1ac1a02c1039676d08a9b9c1b3195dcfe2dd30f8c2ac51fec351cce8567e918f