Analysis
-
max time kernel
169s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
24-03-2022 22:26
Behavioral task
behavioral1
Sample
655b72ec70fb1b8900966a0ebc580265bc5943a448d86cf0127d9620c55156be.pdf
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
655b72ec70fb1b8900966a0ebc580265bc5943a448d86cf0127d9620c55156be.pdf
Resource
win10v2004-20220310-en
General
-
Target
655b72ec70fb1b8900966a0ebc580265bc5943a448d86cf0127d9620c55156be.pdf
-
Size
40KB
-
MD5
95b7629530e0f820b8120df6057cbd12
-
SHA1
731b70a42871265a15de417c710ae7ddbe4df331
-
SHA256
655b72ec70fb1b8900966a0ebc580265bc5943a448d86cf0127d9620c55156be
-
SHA512
0c0357f620d34fedd92a288165daedabc8de4fd06339b902e018770bb7c1e7f5035b9c418ec86c3775be430dc61a69c9f43750ea49094643d179f0660e7d4b07
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2403053463-4052593947-3703345493-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AcroRd32.exepid process 3396 AcroRd32.exe 3396 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 3396 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
AcroRd32.exepid process 3396 AcroRd32.exe 3396 AcroRd32.exe 3396 AcroRd32.exe 3396 AcroRd32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
AcroRd32.exedescription pid process target process PID 3396 wrote to memory of 4684 3396 AcroRd32.exe RdrCEF.exe PID 3396 wrote to memory of 4684 3396 AcroRd32.exe RdrCEF.exe PID 3396 wrote to memory of 4684 3396 AcroRd32.exe RdrCEF.exe PID 3396 wrote to memory of 4364 3396 AcroRd32.exe RdrCEF.exe PID 3396 wrote to memory of 4364 3396 AcroRd32.exe RdrCEF.exe PID 3396 wrote to memory of 4364 3396 AcroRd32.exe RdrCEF.exe PID 3396 wrote to memory of 2556 3396 AcroRd32.exe RdrCEF.exe PID 3396 wrote to memory of 2556 3396 AcroRd32.exe RdrCEF.exe PID 3396 wrote to memory of 2556 3396 AcroRd32.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\655b72ec70fb1b8900966a0ebc580265bc5943a448d86cf0127d9620c55156be.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵