Analysis
-
max time kernel
93s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 04:57
Behavioral task
behavioral1
Sample
24b416ff4098c5e19fd2cf6e7e10b154_JaffaCakes118.pdf
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
24b416ff4098c5e19fd2cf6e7e10b154_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
24b416ff4098c5e19fd2cf6e7e10b154_JaffaCakes118.pdf
-
Size
51KB
-
MD5
24b416ff4098c5e19fd2cf6e7e10b154
-
SHA1
3c48afc03f86386deeae0e376ae0cf3f0b847f2b
-
SHA256
d4f4258b294565a8d4c59a2723491bd00b5abd26013726d2ad34649cd902edc2
-
SHA512
f3e0fd6786d6d3897da8d20094b7d219cae8ffd23f8dbc5bb7d41031f9e08de590cf1644599e5a533442307c54513e0fc14a38f5158e7d1b7301015e11218d67
-
SSDEEP
1536:Lq763bj5HtmZSAUwlZ/PG9fkaFPInkZWCpE:u7kXaSAJMfkaNIk0
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 968 wrote to memory of 2632 968 AcroRd32.exe 81 PID 968 wrote to memory of 2632 968 AcroRd32.exe 81 PID 968 wrote to memory of 2632 968 AcroRd32.exe 81 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 3964 2632 RdrCEF.exe 82 PID 2632 wrote to memory of 4908 2632 RdrCEF.exe 83 PID 2632 wrote to memory of 4908 2632 RdrCEF.exe 83 PID 2632 wrote to memory of 4908 2632 RdrCEF.exe 83 PID 2632 wrote to memory of 4908 2632 RdrCEF.exe 83 PID 2632 wrote to memory of 4908 2632 RdrCEF.exe 83 PID 2632 wrote to memory of 4908 2632 RdrCEF.exe 83 PID 2632 wrote to memory of 4908 2632 RdrCEF.exe 83 PID 2632 wrote to memory of 4908 2632 RdrCEF.exe 83 PID 2632 wrote to memory of 4908 2632 RdrCEF.exe 83 PID 2632 wrote to memory of 4908 2632 RdrCEF.exe 83 PID 2632 wrote to memory of 4908 2632 RdrCEF.exe 83 PID 2632 wrote to memory of 4908 2632 RdrCEF.exe 83 PID 2632 wrote to memory of 4908 2632 RdrCEF.exe 83 PID 2632 wrote to memory of 4908 2632 RdrCEF.exe 83 PID 2632 wrote to memory of 4908 2632 RdrCEF.exe 83 PID 2632 wrote to memory of 4908 2632 RdrCEF.exe 83 PID 2632 wrote to memory of 4908 2632 RdrCEF.exe 83 PID 2632 wrote to memory of 4908 2632 RdrCEF.exe 83 PID 2632 wrote to memory of 4908 2632 RdrCEF.exe 83 PID 2632 wrote to memory of 4908 2632 RdrCEF.exe 83
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\24b416ff4098c5e19fd2cf6e7e10b154_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=67D15A692A01EE512EAC81FA5ACA06A6 --mojo-platform-channel-handle=1724 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3964
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=0F5ACF81E5D845C35B906E0EF530D547 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=0F5ACF81E5D845C35B906E0EF530D547 --renderer-client-id=2 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job /prefetch:13⤵PID:4908
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C44090A5209A8F5DF58855535A0169DF --mojo-platform-channel-handle=2296 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1428
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B770DA5F49C823C4CAE53B03E473E095 --mojo-platform-channel-handle=1812 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3492
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F072A40D3622DF9A585B668056225E10 --mojo-platform-channel-handle=2376 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2688
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2132
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5d4f17a801c05a2253158a8f7f3df7ce2
SHA121f9fd97d63db69e421eed71c714956ec5e66060
SHA25680c560cce6e4f48a99ea82b09e6549e5c1f08d1ff07ba17034c7d6e3ec821351
SHA5126e0cd396eba5b5dd71a4cb3e4b41db22ccd73468a79314b3a37096f5830e436d87202ef039c0881ae5e502e1aba493c7891b7dd66518e742673d65da9ae89e0c
-
Filesize
64KB
MD5bae4e31989a00673f2e622a8e22640c7
SHA1563cf9d68d091aa37d6040a59adc422ff42f9c82
SHA256833365a668c89035ec0a624ecc0a6091d5bffd8a1b7fed6ddebe4bb2bb6516a1
SHA5126894dad677b9ffd1ce41768be1c1faa65ef5e9cec5e70e4fa29fb41edd3f68e580f4ff6412d04715b5bff3965ea9376cc1f479728bdccb75b39541ee42df9f82