Resubmissions
16-03-2022 13:06
220316-qccq7aead6 416-03-2022 10:43
220316-msa1raagfn 416-03-2022 10:37
220316-mnxc7aagcj 416-03-2022 09:54
220316-lw79zsadap 10Analysis
-
max time kernel
179s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
16-03-2022 10:37
Behavioral task
behavioral1
Sample
1a9f775e93356e6d09549721bcab5e5ded27ef7d3a2200cce80b1f89514c8646.pdf
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
1a9f775e93356e6d09549721bcab5e5ded27ef7d3a2200cce80b1f89514c8646.pdf
Resource
win10v2004-en-20220113
General
-
Target
1a9f775e93356e6d09549721bcab5e5ded27ef7d3a2200cce80b1f89514c8646.pdf
-
Size
776KB
-
MD5
8a9f834abf7d6cfb6452ff3102ec998d
-
SHA1
14e108594294c230a5445b6df54bb8f74a984cdc
-
SHA256
1a9f775e93356e6d09549721bcab5e5ded27ef7d3a2200cce80b1f89514c8646
-
SHA512
68671bf392af9f82de5e3d99e7a13f04e82faab6cb980d5371dce5f08c2f85661f5e6d8016ec15e43c323f41fe304ddb7b95ff60fbc99b76c6295858d094bcbb
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
AcroRd32.exepid process 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 1056 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
AcroRd32.exeAdobeARM.exepid process 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe 3436 AdobeARM.exe 1056 AcroRd32.exe 1056 AcroRd32.exe 1056 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 1056 wrote to memory of 3484 1056 AcroRd32.exe RdrCEF.exe PID 1056 wrote to memory of 3484 1056 AcroRd32.exe RdrCEF.exe PID 1056 wrote to memory of 3484 1056 AcroRd32.exe RdrCEF.exe PID 1056 wrote to memory of 4232 1056 AcroRd32.exe RdrCEF.exe PID 1056 wrote to memory of 4232 1056 AcroRd32.exe RdrCEF.exe PID 1056 wrote to memory of 4232 1056 AcroRd32.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 4788 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 372 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 372 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 372 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 372 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 372 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 372 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 372 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 372 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 372 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 372 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 372 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 372 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 372 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 372 3484 RdrCEF.exe RdrCEF.exe PID 3484 wrote to memory of 372 3484 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1a9f775e93356e6d09549721bcab5e5ded27ef7d3a2200cce80b1f89514c8646.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=6B497288F23559874311C77A40F7CF03 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=6B497288F23559874311C77A40F7CF03 --renderer-client-id=2 --mojo-platform-channel-handle=1736 --allow-no-sandbox-job /prefetch:13⤵PID:4788
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9A89D0E742CF4A751CC85515E3DD04DC --mojo-platform-channel-handle=1848 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:372
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=053C4CE6A35182B742363A143BBE1DA1 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=053C4CE6A35182B742363A143BBE1DA1 --renderer-client-id=4 --mojo-platform-channel-handle=2164 --allow-no-sandbox-job /prefetch:13⤵PID:4108
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D7C062643C00E22F9793EF319229581B --mojo-platform-channel-handle=1856 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4956
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=88636619E634A6F4178029934390462C --mojo-platform-channel-handle=2676 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3336
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BD528BEA84CCDF99D9A702DF1450B3D0 --mojo-platform-channel-handle=2128 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3420
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=BB2E0CBF5F984EBF5E94A73F540FEA6B --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=BB2E0CBF5F984EBF5E94A73F540FEA6B --renderer-client-id=10 --mojo-platform-channel-handle=2772 --allow-no-sandbox-job /prefetch:13⤵PID:4688
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:4232
-
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" /PRODUCT:Reader /VERSION:19.0 /MODE:32⤵
- Suspicious use of SetWindowsHookEx
PID:3436 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"3⤵PID:1592
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:1820
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Adobe\ARM\Reader_19.010.20069\ReaderDCManifest2.msiMD5
6f014505b038aa70695dc6557662df8b
SHA125607777270af2b0a38da97d8d98ab9bc7926980
SHA25652040d7492e91856c658e4779bdc2de38a81f47e5136d9a772f4559178fbe7fc
SHA51225c53e4b7c273b3699be727e5a6688dbfad7b6633d78d29e753bc3446b8e2b5e8c752a8842870264fe10a2b3a0246c335bea7457daa289faec67f7ca7c2aaac0
-
memory/1820-131-0x00000208B71E0000-0x00000208B71F0000-memory.dmpFilesize
64KB
-
memory/1820-130-0x00000208B7180000-0x00000208B7190000-memory.dmpFilesize
64KB
-
memory/1820-132-0x00000208B75A0000-0x00000208B75A4000-memory.dmpFilesize
16KB