Analysis
-
max time kernel
122s -
max time network
143s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
07-11-2021 19:11
Behavioral task
behavioral1
Sample
2428896126181551o 907300407262850122109021o 48317830512642470289731o 7538169572477121623158708268o 1.pdf
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
2428896126181551o 907300407262850122109021o 48317830512642470289731o 7538169572477121623158708268o 1.pdf
Resource
win10-en-20211014
General
-
Target
2428896126181551o 907300407262850122109021o 48317830512642470289731o 7538169572477121623158708268o 1.pdf
-
Size
128KB
-
MD5
951a58bb3b8be9003dff1c5fb928bac6
-
SHA1
f4eb43e2038fdea33f04e6eb34b308f13551b035
-
SHA256
d0c87b6a39f733a69a110f2755ff68cbddbcc7c562651238eb3087ad240d9541
-
SHA512
949a4695b4b78843f0663cc36e8033a20b232db089e96013a0408c63dce97a1c57a66cd59af7f0efed8d8d1ebd3563223fc1a00d4f10a93159db0a54be980529
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
AcroRd32.exepid process 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 2800 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AcroRd32.exepid process 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 2800 wrote to memory of 1412 2800 AcroRd32.exe RdrCEF.exe PID 2800 wrote to memory of 1412 2800 AcroRd32.exe RdrCEF.exe PID 2800 wrote to memory of 1412 2800 AcroRd32.exe RdrCEF.exe PID 2800 wrote to memory of 3532 2800 AcroRd32.exe RdrCEF.exe PID 2800 wrote to memory of 3532 2800 AcroRd32.exe RdrCEF.exe PID 2800 wrote to memory of 3532 2800 AcroRd32.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 68 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 3312 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 3312 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 3312 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 3312 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 3312 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 3312 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 3312 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 3312 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 3312 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 3312 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 3312 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 3312 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 3312 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 3312 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 3312 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 3312 1412 RdrCEF.exe RdrCEF.exe PID 1412 wrote to memory of 3312 1412 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2428896126181551o 907300407262850122109021o 48317830512642470289731o 7538169572477121623158708268o 1.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=66DC56E6B0652909C56CE0332C3778E5 --mojo-platform-channel-handle=1628 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=8FD0A333EA1C71ABD54CEBF0BC7C8113 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=8FD0A333EA1C71ABD54CEBF0BC7C8113 --renderer-client-id=2 --mojo-platform-channel-handle=1636 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0A8533BA8F32661061E261A8070178CA --mojo-platform-channel-handle=2228 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C3F59187CDA3F5431774312AD53EA445 --mojo-platform-channel-handle=2240 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3A4FDF230CCB4D0D2D5BEC1C6DD04911 --mojo-platform-channel-handle=2324 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=06D7D200EA6E998CC6CE2277B4C3EE8A --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=06D7D200EA6E998CC6CE2277B4C3EE8A --renderer-client-id=7 --mojo-platform-channel-handle=1628 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/68-117-0x00000000771B2000-0x00000000771B3000-memory.dmpFilesize
4KB
-
memory/68-118-0x000000000051B000-0x000000000051C000-memory.dmpFilesize
4KB
-
memory/68-120-0x00000000000D0000-0x00000000000D1000-memory.dmpFilesize
4KB
-
memory/68-119-0x0000000000000000-mapping.dmp
-
memory/1412-115-0x0000000000000000-mapping.dmp
-
memory/2076-137-0x0000000000000000-mapping.dmp
-
memory/2076-135-0x00000000771B2000-0x00000000771B3000-memory.dmpFilesize
4KB
-
memory/2076-136-0x0000000001233000-0x0000000001234000-memory.dmpFilesize
4KB
-
memory/3008-128-0x00000000009B5000-0x00000000009B6000-memory.dmpFilesize
4KB
-
memory/3008-127-0x00000000771B2000-0x00000000771B3000-memory.dmpFilesize
4KB
-
memory/3008-129-0x0000000000000000-mapping.dmp
-
memory/3252-141-0x0000000000000000-mapping.dmp
-
memory/3252-140-0x0000000001221000-0x0000000001222000-memory.dmpFilesize
4KB
-
memory/3252-139-0x00000000771B2000-0x00000000771B3000-memory.dmpFilesize
4KB
-
memory/3312-126-0x0000000000B50000-0x0000000000B51000-memory.dmpFilesize
4KB
-
memory/3312-125-0x0000000000430000-0x0000000000431000-memory.dmpFilesize
4KB
-
memory/3312-123-0x0000000000000000-mapping.dmp
-
memory/3312-122-0x0000000000B36000-0x0000000000B37000-memory.dmpFilesize
4KB
-
memory/3312-121-0x00000000771B2000-0x00000000771B3000-memory.dmpFilesize
4KB
-
memory/3532-116-0x0000000000000000-mapping.dmp
-
memory/3676-132-0x0000000000D08000-0x0000000000D09000-memory.dmpFilesize
4KB
-
memory/3676-133-0x0000000000000000-mapping.dmp
-
memory/3676-131-0x00000000771B2000-0x00000000771B3000-memory.dmpFilesize
4KB