Analysis
-
max time kernel
136s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-05-2022 02:00
Behavioral task
behavioral1
Sample
DTO 120522.pdf
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
DTO 120522.pdf
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
DTO 120522.pdf
-
Size
342KB
-
MD5
6f008e0fd3acfe5894285e239d3465bb
-
SHA1
0641b73486b49573b2ad8b0c1a0d7ab0942f287b
-
SHA256
5bc737eeccdca2d84d269fe2f02c14e7fb261f679c4e11a162fcb17a82ddfacc
-
SHA512
854eca42f9c3c000b1165065dfb5e027a63f295ff319b4c01c2fba3bbb53c034c137cca87fce6e3badfa4bf8850a04a5bbc25372c87be808bd839a64d78617e8
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
AcroRd32.exepid process 5080 AcroRd32.exe 5080 AcroRd32.exe 5080 AcroRd32.exe 5080 AcroRd32.exe 5080 AcroRd32.exe 5080 AcroRd32.exe 5080 AcroRd32.exe 5080 AcroRd32.exe 5080 AcroRd32.exe 5080 AcroRd32.exe 5080 AcroRd32.exe 5080 AcroRd32.exe 5080 AcroRd32.exe 5080 AcroRd32.exe 5080 AcroRd32.exe 5080 AcroRd32.exe 5080 AcroRd32.exe 5080 AcroRd32.exe 5080 AcroRd32.exe 5080 AcroRd32.exe 5080 AcroRd32.exe 5080 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 5080 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
AcroRd32.exeAdobeARM.exepid process 5080 AcroRd32.exe 5080 AcroRd32.exe 5080 AcroRd32.exe 5080 AcroRd32.exe 1952 AdobeARM.exe 5080 AcroRd32.exe 5080 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 5080 wrote to memory of 4900 5080 AcroRd32.exe RdrCEF.exe PID 5080 wrote to memory of 4900 5080 AcroRd32.exe RdrCEF.exe PID 5080 wrote to memory of 4900 5080 AcroRd32.exe RdrCEF.exe PID 5080 wrote to memory of 3816 5080 AcroRd32.exe RdrCEF.exe PID 5080 wrote to memory of 3816 5080 AcroRd32.exe RdrCEF.exe PID 5080 wrote to memory of 3816 5080 AcroRd32.exe RdrCEF.exe PID 5080 wrote to memory of 2040 5080 AcroRd32.exe RdrCEF.exe PID 5080 wrote to memory of 2040 5080 AcroRd32.exe RdrCEF.exe PID 5080 wrote to memory of 2040 5080 AcroRd32.exe RdrCEF.exe PID 5080 wrote to memory of 488 5080 AcroRd32.exe RdrCEF.exe PID 5080 wrote to memory of 488 5080 AcroRd32.exe RdrCEF.exe PID 5080 wrote to memory of 488 5080 AcroRd32.exe RdrCEF.exe PID 5080 wrote to memory of 1740 5080 AcroRd32.exe RdrCEF.exe PID 5080 wrote to memory of 1740 5080 AcroRd32.exe RdrCEF.exe PID 5080 wrote to memory of 1740 5080 AcroRd32.exe RdrCEF.exe PID 5080 wrote to memory of 1952 5080 AcroRd32.exe AdobeARM.exe PID 5080 wrote to memory of 1952 5080 AcroRd32.exe AdobeARM.exe PID 5080 wrote to memory of 1952 5080 AcroRd32.exe AdobeARM.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 4512 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 3724 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 3724 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 3724 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 3724 1740 RdrCEF.exe RdrCEF.exe PID 1740 wrote to memory of 3724 1740 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\DTO 120522.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3737F42D9C4C3A98C2E3EB12AD1D965D --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=9CA6E3C6D9BCF39CB8DE6F5F018EE775 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=9CA6E3C6D9BCF39CB8DE6F5F018EE775 --renderer-client-id=2 --mojo-platform-channel-handle=1768 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1157DBA2E967F3519E7018D43CCA5C51 --mojo-platform-channel-handle=2292 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0CE6445A6DA9A0208FE7BF6BDDC0023F --mojo-platform-channel-handle=1820 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=31D6BA7236FA05D77C8B66928518A2BD --mojo-platform-channel-handle=1860 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=4104C9007B2A4A87C4BD6B18EE6E73BF --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=4104C9007B2A4A87C4BD6B18EE6E73BF --renderer-client-id=8 --mojo-platform-channel-handle=1928 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" /PRODUCT:Reader /VERSION:19.0 /MODE:32⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"3⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/488-133-0x0000000000000000-mapping.dmp
-
memory/824-149-0x0000000000000000-mapping.dmp
-
memory/1372-146-0x0000000000000000-mapping.dmp
-
memory/1740-134-0x0000000000000000-mapping.dmp
-
memory/1952-135-0x0000000000000000-mapping.dmp
-
memory/2040-132-0x0000000000000000-mapping.dmp
-
memory/2772-152-0x0000000000000000-mapping.dmp
-
memory/3676-144-0x0000000000000000-mapping.dmp
-
memory/3712-155-0x0000000000000000-mapping.dmp
-
memory/3724-140-0x0000000000000000-mapping.dmp
-
memory/3816-131-0x0000000000000000-mapping.dmp
-
memory/4512-137-0x0000000000000000-mapping.dmp
-
memory/4900-130-0x0000000000000000-mapping.dmp