Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
19-05-2022 14:54
Behavioral task
behavioral1
Sample
MARKETS_NOW.pdf
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
MARKETS_NOW.pdf
Resource
win10-20220414-en
windows10_x64
0 signatures
0 seconds
Behavioral task
behavioral3
Sample
MARKETS_NOW.pdf
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
MARKETS_NOW.pdf
-
Size
370KB
-
MD5
ddac2700a6324381c8aa298d25c75de2
-
SHA1
e049f6e99f203bc8ba6b25b24ca906aadd0b9b09
-
SHA256
6e27461123ab8f0f1a96d8959e7f811451d031f40faae5b88db919edac3f894a
-
SHA512
6bc118fc49be6e34fc3d8e41d6c35df8b4edfe6fc3be8710a296e32d36ee3f6c061d7b799e1eea34fc0dec8dd9dafd5aa6b7a511d453a367a4053735590aff8c
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
AcroRd32.exeAdobeARM.exepid process 1632 AcroRd32.exe 1632 AcroRd32.exe 1632 AcroRd32.exe 1632 AcroRd32.exe 1632 AcroRd32.exe 1632 AcroRd32.exe 1632 AcroRd32.exe 1632 AcroRd32.exe 1632 AcroRd32.exe 1632 AcroRd32.exe 1632 AcroRd32.exe 1632 AcroRd32.exe 1632 AcroRd32.exe 1632 AcroRd32.exe 1632 AcroRd32.exe 1632 AcroRd32.exe 1632 AcroRd32.exe 1632 AcroRd32.exe 1632 AcroRd32.exe 1632 AcroRd32.exe 1780 AdobeARM.exe 1780 AdobeARM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 1632 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
AcroRd32.exeAdobeARM.exepid process 1632 AcroRd32.exe 1632 AcroRd32.exe 1632 AcroRd32.exe 1632 AcroRd32.exe 1632 AcroRd32.exe 1632 AcroRd32.exe 1780 AdobeARM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 1632 wrote to memory of 4256 1632 AcroRd32.exe RdrCEF.exe PID 1632 wrote to memory of 4256 1632 AcroRd32.exe RdrCEF.exe PID 1632 wrote to memory of 4256 1632 AcroRd32.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4448 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4072 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4072 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4072 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4072 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4072 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4072 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4072 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4072 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4072 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4072 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4072 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4072 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4072 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4072 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4072 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4072 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4072 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4072 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4072 4256 RdrCEF.exe RdrCEF.exe PID 4256 wrote to memory of 4072 4256 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\MARKETS_NOW.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D70B73391461C85B42817A9C76C5A326 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=35C552A88B3A0A90C46775367824C94D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=35C552A88B3A0A90C46775367824C94D --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=2F4D934E3D2A21FF8F47C1E267587034 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=2F4D934E3D2A21FF8F47C1E267587034 --renderer-client-id=4 --mojo-platform-channel-handle=2172 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1EC6159C46BB9244BD586DA00E7D87A8 --mojo-platform-channel-handle=2548 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=16AD984A706340B2CE404509FC84D81F --mojo-platform-channel-handle=1848 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1B0298ED2D6C37FDB327F4ADDDC55FC3 --mojo-platform-channel-handle=2664 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" /PRODUCT:Reader /VERSION:19.0 /MODE:32⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"3⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1780-153-0x0000000000000000-mapping.dmp
-
memory/3012-148-0x0000000000000000-mapping.dmp
-
memory/4072-135-0x0000000000000000-mapping.dmp
-
memory/4112-140-0x0000000000000000-mapping.dmp
-
memory/4256-130-0x0000000000000000-mapping.dmp
-
memory/4448-132-0x0000000000000000-mapping.dmp
-
memory/4776-151-0x0000000000000000-mapping.dmp
-
memory/5048-145-0x0000000000000000-mapping.dmp
-
memory/5068-154-0x0000000000000000-mapping.dmp