Analysis
-
max time kernel
165s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
17-02-2022 00:00
Behavioral task
behavioral1
Sample
PEF Staff Physicians 2021.pdf
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
PEF Staff Physicians 2021.pdf
Resource
win10v2004-en-20220113
General
-
Target
PEF Staff Physicians 2021.pdf
-
Size
342KB
-
MD5
de1ab9223dae5bb4a7e838b116d7ba28
-
SHA1
64665d93b43a2f628ce33d19edaab14cb6798630
-
SHA256
3b54ba57611b030eeca4e5083992064c4a2d4ab2d7c4b6e24e0b0710018d9ada
-
SHA512
9aec08bcfe0efb2460a5e0f0858dff52dbb3832cd10b82f1c18a84a7f5379e68641738a276e3d1fe462232ceaa6a06ca2da8045012e44358ecff23f575475104
Malware Config
Signatures
-
Drops file in Windows directory 8 IoCs
Processes:
TiWorker.exesvchost.exedescription ioc process File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
AcroRd32.exepid process 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exeTiWorker.exedescription pid process Token: SeShutdownPrivilege 2708 svchost.exe Token: SeCreatePagefilePrivilege 2708 svchost.exe Token: SeShutdownPrivilege 2708 svchost.exe Token: SeCreatePagefilePrivilege 2708 svchost.exe Token: SeShutdownPrivilege 2708 svchost.exe Token: SeCreatePagefilePrivilege 2708 svchost.exe Token: SeSecurityPrivilege 2572 TiWorker.exe Token: SeRestorePrivilege 2572 TiWorker.exe Token: SeBackupPrivilege 2572 TiWorker.exe Token: SeBackupPrivilege 2572 TiWorker.exe Token: SeRestorePrivilege 2572 TiWorker.exe Token: SeSecurityPrivilege 2572 TiWorker.exe Token: SeBackupPrivilege 2572 TiWorker.exe Token: SeRestorePrivilege 2572 TiWorker.exe Token: SeSecurityPrivilege 2572 TiWorker.exe Token: SeBackupPrivilege 2572 TiWorker.exe Token: SeRestorePrivilege 2572 TiWorker.exe Token: SeSecurityPrivilege 2572 TiWorker.exe Token: SeBackupPrivilege 2572 TiWorker.exe Token: SeRestorePrivilege 2572 TiWorker.exe Token: SeSecurityPrivilege 2572 TiWorker.exe Token: SeBackupPrivilege 2572 TiWorker.exe Token: SeRestorePrivilege 2572 TiWorker.exe Token: SeSecurityPrivilege 2572 TiWorker.exe Token: SeBackupPrivilege 2572 TiWorker.exe Token: SeRestorePrivilege 2572 TiWorker.exe Token: SeSecurityPrivilege 2572 TiWorker.exe Token: SeBackupPrivilege 2572 TiWorker.exe Token: SeRestorePrivilege 2572 TiWorker.exe Token: SeSecurityPrivilege 2572 TiWorker.exe Token: SeBackupPrivilege 2572 TiWorker.exe Token: SeRestorePrivilege 2572 TiWorker.exe Token: SeSecurityPrivilege 2572 TiWorker.exe Token: SeBackupPrivilege 2572 TiWorker.exe Token: SeRestorePrivilege 2572 TiWorker.exe Token: SeSecurityPrivilege 2572 TiWorker.exe Token: SeBackupPrivilege 2572 TiWorker.exe Token: SeRestorePrivilege 2572 TiWorker.exe Token: SeSecurityPrivilege 2572 TiWorker.exe Token: SeBackupPrivilege 2572 TiWorker.exe Token: SeRestorePrivilege 2572 TiWorker.exe Token: SeSecurityPrivilege 2572 TiWorker.exe Token: SeBackupPrivilege 2572 TiWorker.exe Token: SeRestorePrivilege 2572 TiWorker.exe Token: SeSecurityPrivilege 2572 TiWorker.exe Token: SeBackupPrivilege 2572 TiWorker.exe Token: SeRestorePrivilege 2572 TiWorker.exe Token: SeSecurityPrivilege 2572 TiWorker.exe Token: SeBackupPrivilege 2572 TiWorker.exe Token: SeRestorePrivilege 2572 TiWorker.exe Token: SeSecurityPrivilege 2572 TiWorker.exe Token: SeBackupPrivilege 2572 TiWorker.exe Token: SeRestorePrivilege 2572 TiWorker.exe Token: SeSecurityPrivilege 2572 TiWorker.exe Token: SeBackupPrivilege 2572 TiWorker.exe Token: SeRestorePrivilege 2572 TiWorker.exe Token: SeSecurityPrivilege 2572 TiWorker.exe Token: SeBackupPrivilege 2572 TiWorker.exe Token: SeRestorePrivilege 2572 TiWorker.exe Token: SeSecurityPrivilege 2572 TiWorker.exe Token: SeBackupPrivilege 2572 TiWorker.exe Token: SeRestorePrivilege 2572 TiWorker.exe Token: SeSecurityPrivilege 2572 TiWorker.exe Token: SeBackupPrivilege 2572 TiWorker.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 3568 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
AcroRd32.exeAdobeARM.exepid process 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe 3568 AcroRd32.exe 3100 AdobeARM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 3568 wrote to memory of 3104 3568 AcroRd32.exe RdrCEF.exe PID 3568 wrote to memory of 3104 3568 AcroRd32.exe RdrCEF.exe PID 3568 wrote to memory of 3104 3568 AcroRd32.exe RdrCEF.exe PID 3568 wrote to memory of 2052 3568 AcroRd32.exe RdrCEF.exe PID 3568 wrote to memory of 2052 3568 AcroRd32.exe RdrCEF.exe PID 3568 wrote to memory of 2052 3568 AcroRd32.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 4420 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 5044 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 5044 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 5044 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 5044 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 5044 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 5044 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 5044 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 5044 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 5044 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 5044 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 5044 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 5044 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 5044 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 5044 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 5044 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 5044 3104 RdrCEF.exe RdrCEF.exe PID 3104 wrote to memory of 5044 3104 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\PEF Staff Physicians 2021.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3BEDE4D36B3A46D4F3716EB3727E98D4 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4420
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=61D15C7D4B56C3263D750AD9863EEA07 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=61D15C7D4B56C3263D750AD9863EEA07 --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:13⤵PID:5044
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=B3CAE230775AE083DF46355EE4F50F5D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=B3CAE230775AE083DF46355EE4F50F5D --renderer-client-id=4 --mojo-platform-channel-handle=2312 --allow-no-sandbox-job /prefetch:13⤵PID:448
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=761C5553FF8E88FA9B3D278F2AED0B1B --mojo-platform-channel-handle=2324 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1576
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=50F3CB77A4B9568A5688957E37AD66E1 --mojo-platform-channel-handle=1948 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4028
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=70C3ABA086B4FB4D831A914C860E1BAA --mojo-platform-channel-handle=2440 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4424
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=D65C0E562FBC1DB3D21B8FC249CABE8D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=D65C0E562FBC1DB3D21B8FC249CABE8D --renderer-client-id=10 --mojo-platform-channel-handle=2700 --allow-no-sandbox-job /prefetch:13⤵PID:5064
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:2052
-
-
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" /PRODUCT:Reader /VERSION:19.0 /MODE:32⤵
- Suspicious use of SetWindowsHookEx
PID:3100 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"3⤵PID:4504
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:740
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
9879cfce09d602e0fb2bd5837f4d23e2
SHA1f0e234fdc4a8b3e91500f131b7fcdbe1e84487e3
SHA256bdb8e19e63b6a57fffb87e3a5d924a7ce87ff520e4760e87c3a07bdd75305609
SHA512f9c8dec6d2c921a0391b547c6327997d34c1f12aeb75f5681493f1cbd5f431deaf004b36015f107edb41a30a1f885827cf2d5e8979365ec53323f8f215b4ecf3
-
MD5
6f014505b038aa70695dc6557662df8b
SHA125607777270af2b0a38da97d8d98ab9bc7926980
SHA25652040d7492e91856c658e4779bdc2de38a81f47e5136d9a772f4559178fbe7fc
SHA51225c53e4b7c273b3699be727e5a6688dbfad7b6633d78d29e753bc3446b8e2b5e8c752a8842870264fe10a2b3a0246c335bea7457daa289faec67f7ca7c2aaac0
-
MD5
9143aa55d6501307e953cb70ef371d95
SHA1caf0709471745e9fe777e72f14b76dec9323feb7
SHA2567b28c43870421a07e46dbcc29b6f5d3fa4d0656328c318eeabd3780464502827
SHA5121edd5df07c7894fed273d959ac62f64a9c82135d6ab5a151d5fccf72cec0b3e282a1ee4e5baa4037925ab30451b700c565777da2cf3d29dfa5d7ea8c2a3ac9df