Analysis
-
max time kernel
154s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
02-05-2022 21:27
Behavioral task
behavioral1
Sample
cd8c8f5b11cf8df7ea533c8b1562130a07b01ef700dfa45bce2f4c8bacab3da3.pdf
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
cd8c8f5b11cf8df7ea533c8b1562130a07b01ef700dfa45bce2f4c8bacab3da3.pdf
Resource
win10v2004-20220414-en
General
-
Target
cd8c8f5b11cf8df7ea533c8b1562130a07b01ef700dfa45bce2f4c8bacab3da3.pdf
-
Size
16KB
-
MD5
c3305c69b7ee396346405ae184a83fc5
-
SHA1
6614dc4898d06ea745e0dc5870bd29d0f5c32e74
-
SHA256
cd8c8f5b11cf8df7ea533c8b1562130a07b01ef700dfa45bce2f4c8bacab3da3
-
SHA512
b57008645fe87933841fecf049d56eb3a5ba5703bd236ae50404e4c7e09ccbab52c74fc6a7323814e2b530ae9dd66ebe08e2420c0aa16a2fc1030a9924bc15a0
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
AcroRd32.exeAdobeARM.exepid process 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 364 AdobeARM.exe 364 AdobeARM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 4816 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
AcroRd32.exeAdobeARM.exepid process 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 4816 AcroRd32.exe 364 AdobeARM.exe 4816 AcroRd32.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
AcroRd32.exeAdobeARM.exedescription pid process target process PID 4816 wrote to memory of 2120 4816 AcroRd32.exe RdrCEF.exe PID 4816 wrote to memory of 2120 4816 AcroRd32.exe RdrCEF.exe PID 4816 wrote to memory of 2120 4816 AcroRd32.exe RdrCEF.exe PID 4816 wrote to memory of 2004 4816 AcroRd32.exe RdrCEF.exe PID 4816 wrote to memory of 2004 4816 AcroRd32.exe RdrCEF.exe PID 4816 wrote to memory of 2004 4816 AcroRd32.exe RdrCEF.exe PID 4816 wrote to memory of 3704 4816 AcroRd32.exe RdrCEF.exe PID 4816 wrote to memory of 3704 4816 AcroRd32.exe RdrCEF.exe PID 4816 wrote to memory of 3704 4816 AcroRd32.exe RdrCEF.exe PID 4816 wrote to memory of 1264 4816 AcroRd32.exe RdrCEF.exe PID 4816 wrote to memory of 1264 4816 AcroRd32.exe RdrCEF.exe PID 4816 wrote to memory of 1264 4816 AcroRd32.exe RdrCEF.exe PID 4816 wrote to memory of 4316 4816 AcroRd32.exe RdrCEF.exe PID 4816 wrote to memory of 4316 4816 AcroRd32.exe RdrCEF.exe PID 4816 wrote to memory of 4316 4816 AcroRd32.exe RdrCEF.exe PID 4816 wrote to memory of 4704 4816 AcroRd32.exe RdrCEF.exe PID 4816 wrote to memory of 4704 4816 AcroRd32.exe RdrCEF.exe PID 4816 wrote to memory of 4704 4816 AcroRd32.exe RdrCEF.exe PID 4816 wrote to memory of 364 4816 AcroRd32.exe AdobeARM.exe PID 4816 wrote to memory of 364 4816 AcroRd32.exe AdobeARM.exe PID 4816 wrote to memory of 364 4816 AcroRd32.exe AdobeARM.exe PID 364 wrote to memory of 1472 364 AdobeARM.exe Reader_sl.exe PID 364 wrote to memory of 1472 364 AdobeARM.exe Reader_sl.exe PID 364 wrote to memory of 1472 364 AdobeARM.exe Reader_sl.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\cd8c8f5b11cf8df7ea533c8b1562130a07b01ef700dfa45bce2f4c8bacab3da3.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
-
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" /PRODUCT:Reader /VERSION:19.0 /MODE:32⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/364-136-0x0000000000000000-mapping.dmp
-
memory/1264-133-0x0000000000000000-mapping.dmp
-
memory/1472-137-0x0000000000000000-mapping.dmp
-
memory/2004-131-0x0000000000000000-mapping.dmp
-
memory/2120-130-0x0000000000000000-mapping.dmp
-
memory/3704-132-0x0000000000000000-mapping.dmp
-
memory/4316-134-0x0000000000000000-mapping.dmp
-
memory/4704-135-0x0000000000000000-mapping.dmp