Analysis
-
max time kernel
121s -
max time network
158s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
08-11-2021 19:09
Behavioral task
behavioral1
Sample
skal 1954154195114917848180139981470* 01891400601575544851444308090* 25874747778429489* 371302588195.pdf
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
skal 1954154195114917848180139981470* 01891400601575544851444308090* 25874747778429489* 371302588195.pdf
Resource
win10-en-20211104
General
-
Target
skal 1954154195114917848180139981470* 01891400601575544851444308090* 25874747778429489* 371302588195.pdf
-
Size
183KB
-
MD5
60d2b3396993d2a405d2fb358a52eae7
-
SHA1
693a9a5f900b81849c3cc4134527084080e47f1f
-
SHA256
4077a68122cb42cec3f6901e13e875683144a440d17e2062dbe30ba3fa7a6bcc
-
SHA512
eb3e7e8dabc22fbaab90c2094943dba69cfc7ae56752528a99eb6460acc98a6de2a1ac1aafcc81e65804914f33b14f3c6930f6a304549adf5273059fe29a7370
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
AcroRd32.exepid process 3544 AcroRd32.exe 3544 AcroRd32.exe 3544 AcroRd32.exe 3544 AcroRd32.exe 3544 AcroRd32.exe 3544 AcroRd32.exe 3544 AcroRd32.exe 3544 AcroRd32.exe 3544 AcroRd32.exe 3544 AcroRd32.exe 3544 AcroRd32.exe 3544 AcroRd32.exe 3544 AcroRd32.exe 3544 AcroRd32.exe 3544 AcroRd32.exe 3544 AcroRd32.exe 3544 AcroRd32.exe 3544 AcroRd32.exe 3544 AcroRd32.exe 3544 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 3544 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AcroRd32.exepid process 3544 AcroRd32.exe 3544 AcroRd32.exe 3544 AcroRd32.exe 3544 AcroRd32.exe 3544 AcroRd32.exe 3544 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 3544 wrote to memory of 4508 3544 AcroRd32.exe RdrCEF.exe PID 3544 wrote to memory of 4508 3544 AcroRd32.exe RdrCEF.exe PID 3544 wrote to memory of 4508 3544 AcroRd32.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3220 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3064 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3064 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3064 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3064 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3064 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3064 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3064 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3064 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3064 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3064 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3064 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3064 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3064 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3064 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3064 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3064 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3064 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3064 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3064 4508 RdrCEF.exe RdrCEF.exe PID 4508 wrote to memory of 3064 4508 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\skal 1954154195114917848180139981470_ 01891400601575544851444308090_ 25874747778429489_ 371302588195.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F02174F7D31755CF6DF3016F2AA87214 --mojo-platform-channel-handle=1644 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=5404DF35E52786D6DE7B51972CF10B82 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=5404DF35E52786D6DE7B51972CF10B82 --renderer-client-id=2 --mojo-platform-channel-handle=1648 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=4E192DF716CE944D17D8329EA50AD878 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=4E192DF716CE944D17D8329EA50AD878 --renderer-client-id=4 --mojo-platform-channel-handle=2232 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=887B7AD1620271B83687306B04E3D943 --mojo-platform-channel-handle=2616 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9BF2F424275FBF67549D73B31F5DA074 --mojo-platform-channel-handle=2612 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=50C948D6F1BABFE012F9B96588D1111E --mojo-platform-channel-handle=2640 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/420-129-0x00000000775B2000-0x00000000775B3000-memory.dmpFilesize
4KB
-
memory/420-130-0x0000000000D13000-0x0000000000D14000-memory.dmpFilesize
4KB
-
memory/420-131-0x0000000000000000-mapping.dmp
-
memory/1536-137-0x0000000000000000-mapping.dmp
-
memory/1536-135-0x00000000775B2000-0x00000000775B3000-memory.dmpFilesize
4KB
-
memory/1536-136-0x0000000000D19000-0x0000000000D1A000-memory.dmpFilesize
4KB
-
memory/2204-141-0x0000000000000000-mapping.dmp
-
memory/2204-140-0x0000000000A5E000-0x0000000000A5F000-memory.dmpFilesize
4KB
-
memory/2204-139-0x00000000775B2000-0x00000000775B3000-memory.dmpFilesize
4KB
-
memory/2644-145-0x0000000000000000-mapping.dmp
-
memory/2644-144-0x0000000000BFD000-0x0000000000BFE000-memory.dmpFilesize
4KB
-
memory/2644-143-0x00000000775B2000-0x00000000775B3000-memory.dmpFilesize
4KB
-
memory/3064-127-0x0000000000140000-0x0000000000141000-memory.dmpFilesize
4KB
-
memory/3064-128-0x0000000000150000-0x0000000000151000-memory.dmpFilesize
4KB
-
memory/3064-124-0x0000000000794000-0x0000000000795000-memory.dmpFilesize
4KB
-
memory/3064-125-0x0000000000000000-mapping.dmp
-
memory/3064-123-0x00000000775B2000-0x00000000775B3000-memory.dmpFilesize
4KB
-
memory/3220-122-0x0000000000080000-0x0000000000081000-memory.dmpFilesize
4KB
-
memory/3220-121-0x0000000000000000-mapping.dmp
-
memory/3220-120-0x00000000009CC000-0x00000000009CD000-memory.dmpFilesize
4KB
-
memory/3220-119-0x00000000775B2000-0x00000000775B3000-memory.dmpFilesize
4KB
-
memory/4508-118-0x0000000000000000-mapping.dmp