Overview
overview
8Static
static
4[email protected]
windows10_x64
1[email protected]...__.pdf
windows10_x64
1[email protected]...?.docx
windows10_x64
4[email protected]...?.docx
windows10_x64
1[email protected]...?.docx
windows10_x64
1[email protected]...??.pdf
windows10_x64
1[email protected]...??.exe
windows10_x64
8[email protected]
windows10_x64
1Analysis
-
max time kernel
117s -
max time network
149s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
23-01-2022 16:38
Behavioral task
behavioral2
Sample
[email protected]/20_10_2021_01_6101_21____________________________.pdf
Resource
win10-en-20211208
Behavioral task
behavioral3
Sample
[email protected]/??? ?? ??????????.docx
Resource
win10-en-20211208
Behavioral task
behavioral4
Sample
[email protected]/?????? ? ????????????????? ?? ????? ?? ???????.docx
Resource
win10-en-20211208
Behavioral task
behavioral5
Sample
[email protected]/?????? ? ??????????????? ?? ????? ?? ???????.docx
Resource
win10-en-20211208
Behavioral task
behavioral6
Sample
[email protected]/???????? ?? ????????? ???????????? ??????.pdf
Resource
win10-en-20211208
Behavioral task
behavioral7
Sample
[email protected]/????????? ??? ??????????? ???????? ? ??????????? ???????? ???????????????.exe
Resource
win10-en-20211208
General
-
Target
[email protected]/20_10_2021_01_6101_21____________________________.pdf
-
Size
791KB
-
MD5
cb6a17f8b475ad25f1f9ba494a57471a
-
SHA1
1543d5d4251174300c4262ce7e0d18982a9518b0
-
SHA256
f56f295ed4775a8f07376ab47e624c82996d702f03907f4200f2030a8be5608e
-
SHA512
7cce042dba8474ad31ca079444d1aab623bbf353968a3c25ee4ca9cfd354469b36600b90238950753a13e2caa0ce24b5aa4dd23792e113453434481ab9a3ec93
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
AcroRd32.exepid process 4016 AcroRd32.exe 4016 AcroRd32.exe 4016 AcroRd32.exe 4016 AcroRd32.exe 4016 AcroRd32.exe 4016 AcroRd32.exe 4016 AcroRd32.exe 4016 AcroRd32.exe 4016 AcroRd32.exe 4016 AcroRd32.exe 4016 AcroRd32.exe 4016 AcroRd32.exe 4016 AcroRd32.exe 4016 AcroRd32.exe 4016 AcroRd32.exe 4016 AcroRd32.exe 4016 AcroRd32.exe 4016 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 4016 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AcroRd32.exepid process 4016 AcroRd32.exe 4016 AcroRd32.exe 4016 AcroRd32.exe 4016 AcroRd32.exe 4016 AcroRd32.exe 4016 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 4016 wrote to memory of 4068 4016 AcroRd32.exe RdrCEF.exe PID 4016 wrote to memory of 4068 4016 AcroRd32.exe RdrCEF.exe PID 4016 wrote to memory of 4068 4016 AcroRd32.exe RdrCEF.exe PID 4016 wrote to memory of 1140 4016 AcroRd32.exe RdrCEF.exe PID 4016 wrote to memory of 1140 4016 AcroRd32.exe RdrCEF.exe PID 4016 wrote to memory of 1140 4016 AcroRd32.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 440 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 3416 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 3416 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 3416 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 3416 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 3416 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 3416 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 3416 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 3416 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 3416 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 3416 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 3416 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 3416 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 3416 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 3416 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 3416 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 3416 4068 RdrCEF.exe RdrCEF.exe PID 4068 wrote to memory of 3416 4068 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\[email protected]\20_10_2021_01_6101_21____________________________.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5F77BB16DB22269B02D071ED9F0E97A8 --mojo-platform-channel-handle=1644 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=235364082006A6A1130B8908D4EE0CEC --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=235364082006A6A1130B8908D4EE0CEC --renderer-client-id=2 --mojo-platform-channel-handle=1660 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=4770F704CEF96233B2824127285D7B9C --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=4770F704CEF96233B2824127285D7B9C --renderer-client-id=4 --mojo-platform-channel-handle=2064 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E406491B84890721C2405F7EA4DA2FB8 --mojo-platform-channel-handle=2476 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=46D1C47F28425227CC01EB3127A3CDAA --mojo-platform-channel-handle=1940 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8D369E57F1565D30706DF9404F8C0960 --mojo-platform-channel-handle=2480 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/440-115-0x00000000775F2000-0x00000000775F3000-memory.dmpFilesize
4KB
-
memory/904-128-0x00000000775F2000-0x00000000775F3000-memory.dmpFilesize
4KB
-
memory/1284-131-0x00000000775F2000-0x00000000775F3000-memory.dmpFilesize
4KB
-
memory/1840-134-0x00000000775F2000-0x00000000775F3000-memory.dmpFilesize
4KB
-
memory/3416-118-0x00000000775F2000-0x00000000775F3000-memory.dmpFilesize
4KB