Analysis
-
max time kernel
141s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 10:15
Behavioral task
behavioral1
Sample
2591acf84c9b04adab2219b2c679d325_JaffaCakes118.pdf
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2591acf84c9b04adab2219b2c679d325_JaffaCakes118.pdf
Resource
win10v2004-20240508-en
General
-
Target
2591acf84c9b04adab2219b2c679d325_JaffaCakes118.pdf
-
Size
110KB
-
MD5
2591acf84c9b04adab2219b2c679d325
-
SHA1
009bac892a679d0ad96684e3e48f9e06b7e556d3
-
SHA256
0f20d60885a7ad7a7cf019851f63205310e84c9cf63b06b5e0dd3e9ebcaa8fba
-
SHA512
3e6db3e8fdeb049ec2732a69817d99209033e66aae89b860270ed39a22435db20a45497112a9602dc1b6f6a2ce453435a7b3207fca18030f450b4143ad56d4d0
-
SSDEEP
768:D/yWZSVsV1YPveYmYGbLB/vbQNK775BoQ4mijVJipEhiD6T+bIxp0sO9PGVigGZw:8
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4148 AcroRd32.exe 4148 AcroRd32.exe 4148 AcroRd32.exe 4148 AcroRd32.exe 4148 AcroRd32.exe 4148 AcroRd32.exe 4148 AcroRd32.exe 4148 AcroRd32.exe 4148 AcroRd32.exe 4148 AcroRd32.exe 4148 AcroRd32.exe 4148 AcroRd32.exe 4148 AcroRd32.exe 4148 AcroRd32.exe 4148 AcroRd32.exe 4148 AcroRd32.exe 4148 AcroRd32.exe 4148 AcroRd32.exe 4148 AcroRd32.exe 4148 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4148 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4148 AcroRd32.exe 4148 AcroRd32.exe 4148 AcroRd32.exe 4148 AcroRd32.exe 4148 AcroRd32.exe 4148 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4148 wrote to memory of 2044 4148 AcroRd32.exe 81 PID 4148 wrote to memory of 2044 4148 AcroRd32.exe 81 PID 4148 wrote to memory of 2044 4148 AcroRd32.exe 81 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 4780 2044 RdrCEF.exe 82 PID 2044 wrote to memory of 668 2044 RdrCEF.exe 83 PID 2044 wrote to memory of 668 2044 RdrCEF.exe 83 PID 2044 wrote to memory of 668 2044 RdrCEF.exe 83 PID 2044 wrote to memory of 668 2044 RdrCEF.exe 83 PID 2044 wrote to memory of 668 2044 RdrCEF.exe 83 PID 2044 wrote to memory of 668 2044 RdrCEF.exe 83 PID 2044 wrote to memory of 668 2044 RdrCEF.exe 83 PID 2044 wrote to memory of 668 2044 RdrCEF.exe 83 PID 2044 wrote to memory of 668 2044 RdrCEF.exe 83 PID 2044 wrote to memory of 668 2044 RdrCEF.exe 83 PID 2044 wrote to memory of 668 2044 RdrCEF.exe 83 PID 2044 wrote to memory of 668 2044 RdrCEF.exe 83 PID 2044 wrote to memory of 668 2044 RdrCEF.exe 83 PID 2044 wrote to memory of 668 2044 RdrCEF.exe 83 PID 2044 wrote to memory of 668 2044 RdrCEF.exe 83 PID 2044 wrote to memory of 668 2044 RdrCEF.exe 83 PID 2044 wrote to memory of 668 2044 RdrCEF.exe 83 PID 2044 wrote to memory of 668 2044 RdrCEF.exe 83 PID 2044 wrote to memory of 668 2044 RdrCEF.exe 83 PID 2044 wrote to memory of 668 2044 RdrCEF.exe 83
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2591acf84c9b04adab2219b2c679d325_JaffaCakes118.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A6724D59B110327903EE068DD7638E84 --mojo-platform-channel-handle=1720 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4780
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C714F9B1C52E5277F85CE6029F5B0AF7 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C714F9B1C52E5277F85CE6029F5B0AF7 --renderer-client-id=2 --mojo-platform-channel-handle=1728 --allow-no-sandbox-job /prefetch:13⤵PID:668
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=503EEB5001987ABA67957735C0F6D015 --mojo-platform-channel-handle=2296 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:688
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=698B908466CC47EE6CC01CC3FE2CAE9B --mojo-platform-channel-handle=2424 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:5056
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8DA1C3D7235327EAD124C11F484C3CC5 --mojo-platform-channel-handle=2412 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4828
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=57D09BB6D303F2D0F7712335A86F0A6C --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=57D09BB6D303F2D0F7712335A86F0A6C --renderer-client-id=8 --mojo-platform-channel-handle=1904 --allow-no-sandbox-job /prefetch:13⤵PID:5012
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD575def008331368ff54ddbd487b591a12
SHA113bffd7cecb7b87a11a2564922f644ac5631d38e
SHA2566501f479bea81ef97a9464ebf8e04f165d04c98743b958764000ad51130e76dc
SHA5129f8e655ccb745771d631c8edbc8a1bbdefba314d6f8ba9020dc4082c8c96c02bea4286e841e66eafb81a0026a87283839ce7be443240a124e503aefb3fbe2cc5
-
Filesize
64KB
MD5ead06907ab5005e0a490630c0b2519d9
SHA19a3c1283f56b2d84d88470570636d2d47dbbe6e9
SHA256fcf89ff1f6f8a1bbdc8110e2a6968364ad7cc8c01c3942d4895ec3b1dea67899
SHA5126957812f31a3f1b44ba167e29972243f62d24a97790d55a9dee8db27904c75adab5468c287dd9ce84a4c4fc01681a941422db9ddb1ac8a670fe8078a4a198877