Analysis
-
max time kernel
113s -
max time network
120s -
platform
windows7_x64 -
resource
win7 -
submitted
12-07-2020 08:09
Static task
static1
Behavioral task
behavioral1
Sample
acrord32.dll
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
acrord32.dll
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
acrord32.dll
-
Size
364KB
-
MD5
6060f7dc35c4d43728d5ca5286327c01
-
SHA1
35ff54838cb6db9a1829d110d2a6b47001648f17
-
SHA256
8a07c265a20279d4b60da2cc26f2bb041730c90c6d3eca64a8dd9f4a032d85d3
-
SHA512
4898e9afb3858fa1f3eb493ea4d6eb6b3f9701aafceb7ed70aa71ec170fc06530bcbe6e1058547e0473d40630fa85484a37a9aadd143e575144948764ba089b3
Score
8/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1932 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
WerFault.exepid process 1932 WerFault.exe 1932 WerFault.exe 1932 WerFault.exe 1932 WerFault.exe 1932 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 1060 AcroRd32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 740 wrote to memory of 1116 740 rundll32.exe rundll32.exe PID 740 wrote to memory of 1116 740 rundll32.exe rundll32.exe PID 740 wrote to memory of 1116 740 rundll32.exe rundll32.exe PID 740 wrote to memory of 1116 740 rundll32.exe rundll32.exe PID 740 wrote to memory of 1116 740 rundll32.exe rundll32.exe PID 740 wrote to memory of 1116 740 rundll32.exe rundll32.exe PID 740 wrote to memory of 1116 740 rundll32.exe rundll32.exe PID 1116 wrote to memory of 1060 1116 rundll32.exe AcroRd32.exe PID 1116 wrote to memory of 1060 1116 rundll32.exe AcroRd32.exe PID 1116 wrote to memory of 1060 1116 rundll32.exe AcroRd32.exe PID 1116 wrote to memory of 1060 1116 rundll32.exe AcroRd32.exe PID 1116 wrote to memory of 1932 1116 rundll32.exe WerFault.exe PID 1116 wrote to memory of 1932 1116 rundll32.exe WerFault.exe PID 1116 wrote to memory of 1932 1116 rundll32.exe WerFault.exe PID 1116 wrote to memory of 1932 1116 rundll32.exe WerFault.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid process 1060 AcroRd32.exe 1060 AcroRd32.exe 1060 AcroRd32.exe -
Blacklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 4 1116 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1932 1116 WerFault.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acrord32.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acrord32.dll,#12⤵
- Suspicious use of WriteProcessMemory
- Blacklisted process makes network request
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\DOC-2020-05-15T092742.441.pdf"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 10123⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\DOC-2020-05-15T092742.441.pdf
-
memory/1060-1-0x0000000000000000-mapping.dmp
-
memory/1116-12-0x0000000000000000-mapping.dmp
-
memory/1116-9-0x0000000000000000-mapping.dmp
-
memory/1116-15-0x0000000000000000-mapping.dmp
-
memory/1116-5-0x0000000000000000-mapping.dmp
-
memory/1116-6-0x0000000000000000-mapping.dmp
-
memory/1116-7-0x0000000000000000-mapping.dmp
-
memory/1116-8-0x0000000000000000-mapping.dmp
-
memory/1116-14-0x0000000000000000-mapping.dmp
-
memory/1116-10-0x0000000000000000-mapping.dmp
-
memory/1116-11-0x0000000000000000-mapping.dmp
-
memory/1116-0-0x0000000000000000-mapping.dmp
-
memory/1116-13-0x0000000000000000-mapping.dmp
-
memory/1932-3-0x0000000000000000-mapping.dmp
-
memory/1932-4-0x00000000021B0000-0x00000000021C1000-memory.dmpFilesize
68KB
-
memory/1932-16-0x0000000002840000-0x0000000002851000-memory.dmpFilesize
68KB