Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 18:11
Behavioral task
behavioral1
Sample
234b9b1a4019cf9a2a79e0c60bc33dd4_JaffaCakes118.pdf
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
234b9b1a4019cf9a2a79e0c60bc33dd4_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
234b9b1a4019cf9a2a79e0c60bc33dd4_JaffaCakes118.pdf
-
Size
12KB
-
MD5
234b9b1a4019cf9a2a79e0c60bc33dd4
-
SHA1
6ae887ed603f1133604eb94037c740a910e6286d
-
SHA256
43c8136a013b381b4915174ccd5d1b751fc3f93a0aca9abbccbb589694b81845
-
SHA512
128d94fefa6ac4ec324b945aac61844429b260c5344024a3656018dca3fdf0650407e946662f5334f5b4365fa6bab74e5db4d568370403f1edaf11a3b26ddca4
-
SSDEEP
384:DLEMys5sf0O0UErx7olNPslxHK9Avh5CsIqy83RPFOF++:DgIIEYJ5
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4132 AcroRd32.exe 4132 AcroRd32.exe 4132 AcroRd32.exe 4132 AcroRd32.exe 4132 AcroRd32.exe 4132 AcroRd32.exe 4132 AcroRd32.exe 4132 AcroRd32.exe 4132 AcroRd32.exe 4132 AcroRd32.exe 4132 AcroRd32.exe 4132 AcroRd32.exe 4132 AcroRd32.exe 4132 AcroRd32.exe 4132 AcroRd32.exe 4132 AcroRd32.exe 4132 AcroRd32.exe 4132 AcroRd32.exe 4132 AcroRd32.exe 4132 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4132 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4132 AcroRd32.exe 4132 AcroRd32.exe 4132 AcroRd32.exe 4132 AcroRd32.exe 4132 AcroRd32.exe 4132 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4132 wrote to memory of 804 4132 AcroRd32.exe 81 PID 4132 wrote to memory of 804 4132 AcroRd32.exe 81 PID 4132 wrote to memory of 804 4132 AcroRd32.exe 81 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 768 804 RdrCEF.exe 82 PID 804 wrote to memory of 3440 804 RdrCEF.exe 83 PID 804 wrote to memory of 3440 804 RdrCEF.exe 83 PID 804 wrote to memory of 3440 804 RdrCEF.exe 83 PID 804 wrote to memory of 3440 804 RdrCEF.exe 83 PID 804 wrote to memory of 3440 804 RdrCEF.exe 83 PID 804 wrote to memory of 3440 804 RdrCEF.exe 83 PID 804 wrote to memory of 3440 804 RdrCEF.exe 83 PID 804 wrote to memory of 3440 804 RdrCEF.exe 83 PID 804 wrote to memory of 3440 804 RdrCEF.exe 83 PID 804 wrote to memory of 3440 804 RdrCEF.exe 83 PID 804 wrote to memory of 3440 804 RdrCEF.exe 83 PID 804 wrote to memory of 3440 804 RdrCEF.exe 83 PID 804 wrote to memory of 3440 804 RdrCEF.exe 83 PID 804 wrote to memory of 3440 804 RdrCEF.exe 83 PID 804 wrote to memory of 3440 804 RdrCEF.exe 83 PID 804 wrote to memory of 3440 804 RdrCEF.exe 83 PID 804 wrote to memory of 3440 804 RdrCEF.exe 83 PID 804 wrote to memory of 3440 804 RdrCEF.exe 83 PID 804 wrote to memory of 3440 804 RdrCEF.exe 83 PID 804 wrote to memory of 3440 804 RdrCEF.exe 83
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\234b9b1a4019cf9a2a79e0c60bc33dd4_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0A7326CFF6D0E6B45BFF83F3283853C6 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:768
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=66272AA0504D13902A32532AC89B32A6 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=66272AA0504D13902A32532AC89B32A6 --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:13⤵PID:3440
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=78F743789F0A7A8D50D3E1775FF6C9FC --mojo-platform-channel-handle=2308 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3024
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=DA7CABC40B2821C405A68906B0C6866D --mojo-platform-channel-handle=1828 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4920
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=BAEE29B96B64F83A58B549891D05B5AA --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=BAEE29B96B64F83A58B549891D05B5AA --renderer-client-id=6 --mojo-platform-channel-handle=2112 --allow-no-sandbox-job /prefetch:13⤵PID:2684
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=AD0C5483922B6B304C79C1D57580F1A6 --mojo-platform-channel-handle=2700 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1840
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5afa3ab089d30ef4007b66eca7c6439
SHA1eccc8471bf064a963d481ed3ca0ff0c25bfdb54f
SHA256a07359e786d36d9726c1eaf823463670f2d60e83fd5cb1c1016c0fb91ac956fa
SHA5129775b3ec69725ae4f0a5110f303a8de1b6e977cbcd5158cbdfc8864488f4107e873d73a1f5ec2439f52b4bd67c17ac4702c296c10a67e6ab63f620fd5e462886
-
Filesize
64KB
MD588c46c8602beedbe05257982f914f643
SHA1a1aa934a3d55a50d37a2a503c420aa0eab7108f9
SHA25668350787356d65a23d61893520191954409cdce02dff038da66d0be893d00b25
SHA51243b8613e04008f9781bd0830b08a5c368f4499d60466b0e0d987a03fdd8b4d7a237263c0bf777d499946228925f2710ef9600e425a91281b5d1b78fefd22cdac