Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 18:46
Behavioral task
behavioral1
Sample
23626dc2ea3010a3cbf64aec584a1a25_JaffaCakes118.pdf
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
23626dc2ea3010a3cbf64aec584a1a25_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
23626dc2ea3010a3cbf64aec584a1a25_JaffaCakes118.pdf
-
Size
111KB
-
MD5
23626dc2ea3010a3cbf64aec584a1a25
-
SHA1
214b2d57c74c9eac589f458d383d77ddcd2312dd
-
SHA256
70c1bd8e87b0c6fa7098a6c5dc586353da8c34542300bbdc19a8d3c31f02f4dc
-
SHA512
6f7f89963dcceff0ab9b92dd5c288fa3b80a845911c773b0a4bd00dd72c30e95a95e40bf2bb7f356ac3a640801b186f4d605fc05ed001f05bea0e795439fd771
-
SSDEEP
768:D54WZSVsV1YPveYmYGbLB/vbQNK775BoQ4mijVJipEhiD6T+bIxp0sO9PGVigGZw:w
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4684 AcroRd32.exe 4684 AcroRd32.exe 4684 AcroRd32.exe 4684 AcroRd32.exe 4684 AcroRd32.exe 4684 AcroRd32.exe 4684 AcroRd32.exe 4684 AcroRd32.exe 4684 AcroRd32.exe 4684 AcroRd32.exe 4684 AcroRd32.exe 4684 AcroRd32.exe 4684 AcroRd32.exe 4684 AcroRd32.exe 4684 AcroRd32.exe 4684 AcroRd32.exe 4684 AcroRd32.exe 4684 AcroRd32.exe 4684 AcroRd32.exe 4684 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4684 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4684 AcroRd32.exe 4684 AcroRd32.exe 4684 AcroRd32.exe 4684 AcroRd32.exe 4684 AcroRd32.exe 4684 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4684 wrote to memory of 4184 4684 AcroRd32.exe 81 PID 4684 wrote to memory of 4184 4684 AcroRd32.exe 81 PID 4684 wrote to memory of 4184 4684 AcroRd32.exe 81 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 1380 4184 RdrCEF.exe 82 PID 4184 wrote to memory of 4452 4184 RdrCEF.exe 83 PID 4184 wrote to memory of 4452 4184 RdrCEF.exe 83 PID 4184 wrote to memory of 4452 4184 RdrCEF.exe 83 PID 4184 wrote to memory of 4452 4184 RdrCEF.exe 83 PID 4184 wrote to memory of 4452 4184 RdrCEF.exe 83 PID 4184 wrote to memory of 4452 4184 RdrCEF.exe 83 PID 4184 wrote to memory of 4452 4184 RdrCEF.exe 83 PID 4184 wrote to memory of 4452 4184 RdrCEF.exe 83 PID 4184 wrote to memory of 4452 4184 RdrCEF.exe 83 PID 4184 wrote to memory of 4452 4184 RdrCEF.exe 83 PID 4184 wrote to memory of 4452 4184 RdrCEF.exe 83 PID 4184 wrote to memory of 4452 4184 RdrCEF.exe 83 PID 4184 wrote to memory of 4452 4184 RdrCEF.exe 83 PID 4184 wrote to memory of 4452 4184 RdrCEF.exe 83 PID 4184 wrote to memory of 4452 4184 RdrCEF.exe 83 PID 4184 wrote to memory of 4452 4184 RdrCEF.exe 83 PID 4184 wrote to memory of 4452 4184 RdrCEF.exe 83 PID 4184 wrote to memory of 4452 4184 RdrCEF.exe 83 PID 4184 wrote to memory of 4452 4184 RdrCEF.exe 83 PID 4184 wrote to memory of 4452 4184 RdrCEF.exe 83
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\23626dc2ea3010a3cbf64aec584a1a25_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C583274F7464D373A467EA106F0DDB1B --mojo-platform-channel-handle=1728 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1380
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=79BF9E56F2FE99FA94762EB7270D76A3 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=79BF9E56F2FE99FA94762EB7270D76A3 --renderer-client-id=2 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job /prefetch:13⤵PID:4452
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8E3D8C061283ACDAF64026B61121D470 --mojo-platform-channel-handle=2320 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1456
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5E2C3BF5AECEA1F2F997CCDBE79581DB --mojo-platform-channel-handle=1912 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4820
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=AF12D5079F991C2E8250A3190D5F65F8 --mojo-platform-channel-handle=2344 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1388
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=8A6903049B22576F06F6A6B3444C6549 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=8A6903049B22576F06F6A6B3444C6549 --renderer-client-id=8 --mojo-platform-channel-handle=2424 --allow-no-sandbox-job /prefetch:13⤵PID:1556
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD54b383d6cff35fe0ae068d7cfc0cbe349
SHA146dbe03509a695591bd886eaa734957d2bf1fce4
SHA256243369b5dc065cbd9e35b2a12a6edcfdbe628b58e1e80e6e2020802980fbe949
SHA512f969054e32560677d41d03342f325a0abae3d1d226ca952b5dd9990f0af75cb97ebd608086dbd788bf5609bf9955eb261714a42e7bcd7d7db2619bc1899c3e87
-
Filesize
64KB
MD55429fabfa7b5e68876852738dd8ce47b
SHA152ed2066060f95cc2e28c2d17a99f0cdcac12f2e
SHA256cb51e0ee48156fdf5e420bc3600c0f6c8a5103bf4e7bf72cb90c2cc1508607c8
SHA5128c0d8e4cd65534518e330d94446b27fbc6d16cb7364e737f1cf73153077a023cde89ad962bc854f2c6e511a4ad01fb9123372a9cc58253dc1d76bfb1f55b4f3e