Analysis
-
max time kernel
152s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-06-2022 23:42
Static task
static1
Behavioral task
behavioral1
Sample
Demurrage/Demurrage_details.pdf
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Demurrage/Demurrage_details.pdf
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
Demurrage/Demurragefees.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
Demurrage/Demurragefees.exe
Resource
win10v2004-20220414-en
General
-
Target
Demurrage/Demurrage_details.pdf
-
Size
581B
-
MD5
f9f30e94d038cd056e24dd9dd9c4504d
-
SHA1
00b17a0a83a6403bbc4887edbe40772bf5b8297b
-
SHA256
f03a7623524727e6473b228d057f59d35e269817c9944151717b91dcfae9fd6a
-
SHA512
3d67a00b5cae17ba79acfeda04154610c3de42b55f919ee3c542c8aef0e2b168ad200febfa62f2bddaeab36e41acd1a60d2fe361a37a35989921e9c4bf10e36a
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3268 AcroRd32.exe 3268 AcroRd32.exe 3268 AcroRd32.exe 3268 AcroRd32.exe 3268 AcroRd32.exe 3268 AcroRd32.exe 3268 AcroRd32.exe 3268 AcroRd32.exe 3268 AcroRd32.exe 3268 AcroRd32.exe 3268 AcroRd32.exe 3268 AcroRd32.exe 3268 AcroRd32.exe 3268 AcroRd32.exe 3268 AcroRd32.exe 3268 AcroRd32.exe 3268 AcroRd32.exe 3268 AcroRd32.exe 3268 AcroRd32.exe 3268 AcroRd32.exe 2312 AdobeARM.exe 2312 AdobeARM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3268 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3268 AcroRd32.exe 3268 AcroRd32.exe 3268 AcroRd32.exe 3268 AcroRd32.exe 3268 AcroRd32.exe 3268 AcroRd32.exe 2312 AdobeARM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3268 wrote to memory of 4388 3268 AcroRd32.exe 79 PID 3268 wrote to memory of 4388 3268 AcroRd32.exe 79 PID 3268 wrote to memory of 4388 3268 AcroRd32.exe 79 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4812 4388 RdrCEF.exe 83 PID 4388 wrote to memory of 4864 4388 RdrCEF.exe 82 PID 4388 wrote to memory of 4864 4388 RdrCEF.exe 82 PID 4388 wrote to memory of 4864 4388 RdrCEF.exe 82 PID 4388 wrote to memory of 4864 4388 RdrCEF.exe 82 PID 4388 wrote to memory of 4864 4388 RdrCEF.exe 82 PID 4388 wrote to memory of 4864 4388 RdrCEF.exe 82 PID 4388 wrote to memory of 4864 4388 RdrCEF.exe 82 PID 4388 wrote to memory of 4864 4388 RdrCEF.exe 82 PID 4388 wrote to memory of 4864 4388 RdrCEF.exe 82 PID 4388 wrote to memory of 4864 4388 RdrCEF.exe 82 PID 4388 wrote to memory of 4864 4388 RdrCEF.exe 82 PID 4388 wrote to memory of 4864 4388 RdrCEF.exe 82 PID 4388 wrote to memory of 4864 4388 RdrCEF.exe 82 PID 4388 wrote to memory of 4864 4388 RdrCEF.exe 82 PID 4388 wrote to memory of 4864 4388 RdrCEF.exe 82 PID 4388 wrote to memory of 4864 4388 RdrCEF.exe 82 PID 4388 wrote to memory of 4864 4388 RdrCEF.exe 82 PID 4388 wrote to memory of 4864 4388 RdrCEF.exe 82 PID 4388 wrote to memory of 4864 4388 RdrCEF.exe 82 PID 4388 wrote to memory of 4864 4388 RdrCEF.exe 82
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Demurrage\Demurrage_details.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=3256417A70A5D8CE8C6B32215EC45260 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=3256417A70A5D8CE8C6B32215EC45260 --renderer-client-id=2 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job /prefetch:13⤵PID:4864
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A6EDF316162D9433D3777E1E0B5A554A --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4812
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=193DDBC8FFB6995364313831AC31CC95 --mojo-platform-channel-handle=2292 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1404
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=36997F6BE4C4F67A09342B3FD69FF368 --mojo-platform-channel-handle=2416 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4420
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0949E92A44E832663C931259F004AEAB --mojo-platform-channel-handle=2288 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:216
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=7A114D3833A50DA535DF6E6B0C7969A9 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=7A114D3833A50DA535DF6E6B0C7969A9 --renderer-client-id=8 --mojo-platform-channel-handle=2472 --allow-no-sandbox-job /prefetch:13⤵PID:2744
-
-
-
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" /PRODUCT:Reader /VERSION:19.0 /MODE:32⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2312 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"3⤵PID:4556
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1464