Overview
overview
3Static
static
3PDF Embedd...ML.pdf
windows7_x64
1PDF Embedd...ML.pdf
windows10-2004_x64
1HTML Javas...d.html
windows7_x64
1HTML Javas...d.html
windows10-2004_x64
1PDF Javasc...er.pdf
windows7_x64
1PDF Javasc...er.pdf
windows10-2004_x64
1PDF Javascript.pdf
windows7_x64
1PDF Javascript.pdf
windows10-2004_x64
1PDF Launch calc.pdf
windows7_x64
1PDF Launch calc.pdf
windows10-2004_x64
1Analysis
-
max time kernel
176s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
14-04-2022 13:56
Behavioral task
behavioral1
Sample
PDF EmbeddedFile HTML.pdf
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
PDF EmbeddedFile HTML.pdf
Resource
win10v2004-20220331-en
Behavioral task
behavioral3
Sample
HTML Javascript obfuscated.html
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
HTML Javascript obfuscated.html
Resource
win10v2004-20220331-en
Behavioral task
behavioral5
Sample
PDF Javascript trigger.pdf
Resource
win7-20220310-en
Behavioral task
behavioral6
Sample
PDF Javascript trigger.pdf
Resource
win10v2004-20220331-en
Behavioral task
behavioral7
Sample
PDF Javascript.pdf
Resource
win7-20220331-en
Behavioral task
behavioral8
Sample
PDF Javascript.pdf
Resource
win10v2004-20220331-en
Behavioral task
behavioral9
Sample
PDF Launch calc.pdf
Resource
win7-20220331-en
Behavioral task
behavioral10
Sample
PDF Launch calc.pdf
Resource
win10v2004-20220331-en
General
-
Target
PDF EmbeddedFile HTML.pdf
-
Size
2KB
-
MD5
8cc13c9fbff51ca84c3c1c033c3718c6
-
SHA1
81a2357b761df7cc471c590683398d78d77b41f5
-
SHA256
73fb9d94156c360334fc28cfa1ab6639f4f5d1e675734f5f200ad028dc66007c
-
SHA512
e6549646f62894c108f5aa15da4eab7e0f0dc14dcc0917658f56e660661128298a62548edaefe94a3d27e1f53ffac7ed94c2d5f836f18dc4b4aae8dec4638a02
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-157025953-3125636059-437143553-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
AcroRd32.exemsedge.exemsedge.exepid process 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4276 msedge.exe 4276 msedge.exe 4944 msedge.exe 4944 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
msedge.exepid process 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe 4944 msedge.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
AcroRd32.exemsedge.exepid process 4772 AcroRd32.exe 4944 msedge.exe 4944 msedge.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
AcroRd32.exeAdobeARM.exepid process 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 4772 AcroRd32.exe 1512 AdobeARM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exemsedge.exeRdrCEF.exedescription pid process target process PID 4772 wrote to memory of 1012 4772 AcroRd32.exe RdrCEF.exe PID 4772 wrote to memory of 1012 4772 AcroRd32.exe RdrCEF.exe PID 4772 wrote to memory of 1012 4772 AcroRd32.exe RdrCEF.exe PID 4772 wrote to memory of 4500 4772 AcroRd32.exe RdrCEF.exe PID 4772 wrote to memory of 4500 4772 AcroRd32.exe RdrCEF.exe PID 4772 wrote to memory of 4500 4772 AcroRd32.exe RdrCEF.exe PID 4772 wrote to memory of 4944 4772 AcroRd32.exe msedge.exe PID 4772 wrote to memory of 4944 4772 AcroRd32.exe msedge.exe PID 4944 wrote to memory of 1504 4944 msedge.exe msedge.exe PID 4944 wrote to memory of 1504 4944 msedge.exe msedge.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 3460 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 4180 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 4180 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 4180 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 4180 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 4180 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 4180 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 4180 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 4180 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 4180 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 4180 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 4180 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 4180 1012 RdrCEF.exe RdrCEF.exe PID 1012 wrote to memory of 4180 1012 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\PDF EmbeddedFile HTML.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6ED58CF6EAB786FD85AF01C331B2F227 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=D97485C53A69A00BC24DC2BF2E1ED52F --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=D97485C53A69A00BC24DC2BF2E1ED52F --renderer-client-id=2 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\A9Rzytzn9_ca7vx8_3ok.tmp\HTML Javascript obfuscated.html2⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffe727046f8,0x7ffe72704708,0x7ffe727047183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,11354559101750116439,5991196546736597154,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,11354559101750116439,5991196546736597154,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2600 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,11354559101750116439,5991196546736597154,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3336 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11354559101750116439,5991196546736597154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3808 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11354559101750116439,5991196546736597154,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3820 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11354559101750116439,5991196546736597154,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3004 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11354559101750116439,5991196546736597154,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=E2F85886C4AAB47E79594CD76B256A50 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=E2F85886C4AAB47E79594CD76B256A50 --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=23FB10CFE4D83851C84EB1DAB1895C4D --mojo-platform-channel-handle=1880 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8C23A631E155B46E8208661250F1F91C --mojo-platform-channel-handle=2304 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F010E301128FB856BB507D5A74B69C7B --mojo-platform-channel-handle=2412 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9B484D8EE197ADB9ED1BC2B32A630D63 --mojo-platform-channel-handle=2360 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=0EF469D691624177C4C905905DAC5CF7 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=0EF469D691624177C4C905905DAC5CF7 --renderer-client-id=8 --mojo-platform-channel-handle=2388 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
-
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" /PRODUCT:Reader /VERSION:19.0 /MODE:32⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"3⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\A9Rzytzn9_ca7vx8_3ok.tmp\HTML Javascript obfuscated.htmlFilesize
769B
MD56753e429e2a5fb32278e9614eadd3416
SHA14c64652ead8b010e94b267836bdf57b97fa52700
SHA256b71ebf3c71bf7695e41f6a6a0498d651023c1dc705b6aa4b0fef1ae9bcfecf4d
SHA512ce7d5ae038f39cd19f5bf9ee3a3ad095f3102b7277e65cf15cb99a93d8620a1e559418d823c4bc005b477dd5ea8b95d740697c7692077a4811e73c1d4245dc9b
-
\??\pipe\LOCAL\crashpad_4944_RNUNKIASGFIGXNVKMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/360-132-0x0000000000000000-mapping.dmp
-
memory/684-170-0x0000000000000000-mapping.dmp
-
memory/1012-124-0x0000000000000000-mapping.dmp
-
memory/1108-137-0x0000000000000000-mapping.dmp
-
memory/1216-174-0x0000000000000000-mapping.dmp
-
memory/1504-127-0x0000000000000000-mapping.dmp
-
memory/1512-164-0x0000000000000000-mapping.dmp
-
memory/1972-157-0x0000000000000000-mapping.dmp
-
memory/1972-158-0x00007FFE90100000-0x00007FFE90101000-memory.dmpFilesize
4KB
-
memory/2280-165-0x0000000000000000-mapping.dmp
-
memory/2700-177-0x0000000000000000-mapping.dmp
-
memory/3460-129-0x0000000000000000-mapping.dmp
-
memory/3460-162-0x0000000000000000-mapping.dmp
-
memory/3496-150-0x0000000000000000-mapping.dmp
-
memory/4276-159-0x0000000000000000-mapping.dmp
-
memory/4296-167-0x0000000000000000-mapping.dmp
-
memory/4336-145-0x0000000000000000-mapping.dmp
-
memory/4500-125-0x0000000000000000-mapping.dmp
-
memory/4680-142-0x0000000000000000-mapping.dmp
-
memory/4704-134-0x0000000000000000-mapping.dmp
-
memory/4872-152-0x0000000000000000-mapping.dmp
-
memory/4876-148-0x0000000000000000-mapping.dmp
-
memory/4944-126-0x0000000000000000-mapping.dmp