Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 05:45
Behavioral task
behavioral1
Sample
214606f1b041ec4e1174adcba30b0f85_JaffaCakes118.pdf
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
214606f1b041ec4e1174adcba30b0f85_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
214606f1b041ec4e1174adcba30b0f85_JaffaCakes118.pdf
-
Size
20KB
-
MD5
214606f1b041ec4e1174adcba30b0f85
-
SHA1
d344e3f186c688e2a6c6b5b76442c94d9dc47ea2
-
SHA256
ccc820618ff5a7aa6149c9f8176de8fc7dbe5cd826c377f66bc8979be76a78fc
-
SHA512
3dbfbeeb3b9c3f8eb36c50b30b404c7b800c0e140b97164273d7050762c29d54a03758c26a76ef02b8807e61dcc50500c7347137a2a71f51f2d23a84812f2072
-
SSDEEP
384:WysNi+3epWvfiA0iXcT4zhAwTiYidPmCSteOxJvCClkQrweiFe+NrFF/JCArVbGX:l+3epWvfiA0iXcT4zhAwTiYidPmCSteK
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3684 AcroRd32.exe 3684 AcroRd32.exe 3684 AcroRd32.exe 3684 AcroRd32.exe 3684 AcroRd32.exe 3684 AcroRd32.exe 3684 AcroRd32.exe 3684 AcroRd32.exe 3684 AcroRd32.exe 3684 AcroRd32.exe 3684 AcroRd32.exe 3684 AcroRd32.exe 3684 AcroRd32.exe 3684 AcroRd32.exe 3684 AcroRd32.exe 3684 AcroRd32.exe 3684 AcroRd32.exe 3684 AcroRd32.exe 3684 AcroRd32.exe 3684 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3684 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3684 AcroRd32.exe 3684 AcroRd32.exe 3684 AcroRd32.exe 3684 AcroRd32.exe 3684 AcroRd32.exe 3684 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3684 wrote to memory of 400 3684 AcroRd32.exe 83 PID 3684 wrote to memory of 400 3684 AcroRd32.exe 83 PID 3684 wrote to memory of 400 3684 AcroRd32.exe 83 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 3780 400 RdrCEF.exe 84 PID 400 wrote to memory of 2104 400 RdrCEF.exe 85 PID 400 wrote to memory of 2104 400 RdrCEF.exe 85 PID 400 wrote to memory of 2104 400 RdrCEF.exe 85 PID 400 wrote to memory of 2104 400 RdrCEF.exe 85 PID 400 wrote to memory of 2104 400 RdrCEF.exe 85 PID 400 wrote to memory of 2104 400 RdrCEF.exe 85 PID 400 wrote to memory of 2104 400 RdrCEF.exe 85 PID 400 wrote to memory of 2104 400 RdrCEF.exe 85 PID 400 wrote to memory of 2104 400 RdrCEF.exe 85 PID 400 wrote to memory of 2104 400 RdrCEF.exe 85 PID 400 wrote to memory of 2104 400 RdrCEF.exe 85 PID 400 wrote to memory of 2104 400 RdrCEF.exe 85 PID 400 wrote to memory of 2104 400 RdrCEF.exe 85 PID 400 wrote to memory of 2104 400 RdrCEF.exe 85 PID 400 wrote to memory of 2104 400 RdrCEF.exe 85 PID 400 wrote to memory of 2104 400 RdrCEF.exe 85 PID 400 wrote to memory of 2104 400 RdrCEF.exe 85 PID 400 wrote to memory of 2104 400 RdrCEF.exe 85 PID 400 wrote to memory of 2104 400 RdrCEF.exe 85 PID 400 wrote to memory of 2104 400 RdrCEF.exe 85
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\214606f1b041ec4e1174adcba30b0f85_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0201867D424392E5A3B14B45721C37B0 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3780
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=2C8BA0E3D482A778D0955C983CF7371A --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=2C8BA0E3D482A778D0955C983CF7371A --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:13⤵PID:2104
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F98340664BFB8B6C71A8350D84C960E8 --mojo-platform-channel-handle=2316 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4752
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B73806D8A8605CEF673269524DAFB7B5 --mojo-platform-channel-handle=1808 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1644
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=64CF67414FE3D4335C9BB7E33A5A250E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=64CF67414FE3D4335C9BB7E33A5A250E --renderer-client-id=6 --mojo-platform-channel-handle=2336 --allow-no-sandbox-job /prefetch:13⤵PID:816
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=692E1DF0AC719093D65FAC045C0C7439 --mojo-platform-channel-handle=2540 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b39b7a5c6c63e36571de8b64914abc5a
SHA14d1678e3dff7da0624a7f2dd65addbfd4f7e3aa3
SHA25611f93cbc1a00a9c68902e3e42617b392e54ed975e87873de004acf61c7474823
SHA512a5758f4870ea63163e1d1d981660806cc729d30420ff3083ec03def2935ac63b98169561097c356783db0c0f85f670e08457d3b962162c7aeb70e16f9c3e1469
-
Filesize
64KB
MD51d683c0ced460ffdad567a0ff510be51
SHA139e9a85070148f6ff7129b120268174f336ff805
SHA2561110a5fae75e1d50c45a58068afe295f74a2617c7fb19ace4c9e026c71ca45d9
SHA512401332103b892517d67917ee2a3d16c0f6c541d5c12535088174df2f33dfa7bca9539cd92d8b59d1ca1666ff9278cc0e056cfdd55a1d3b979e2813962e060117