Analysis
-
max time kernel
121s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2022 05:54
Static task
static1
Behavioral task
behavioral1
Sample
attachment20220806-25572-1c68oie.pdf
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
attachment20220806-25572-1c68oie.pdf
Resource
win10v2004-20220721-en
General
-
Target
attachment20220806-25572-1c68oie.pdf
-
Size
29KB
-
MD5
5b390ebd772dc4bde198b92aaa0ea616
-
SHA1
e6a1068e6e19afc9417c49bcb8e58213f5d8ad5d
-
SHA256
6d3591e7b5d9b99baf5be21982837da5c31601389d807f12db98c3884803ac38
-
SHA512
bb610b91fa4e6f0258a921fe953e17afd8e2e19ef38d1d3eceb6c8949ac3a150151bab90c651c94e113a849ac756b7f1e6bc3eb3f89c162b5cfa7d65f6c619d0
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{EC8EA0BA-C96E-4858-AE82-2E3963E27455}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{41481C1D-FB14-430B-AE76-7706E8134980}.catalogItem svchost.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exeAcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
AcroRd32.exepid process 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 3108 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AcroRd32.exepid process 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe 3108 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 3108 wrote to memory of 568 3108 AcroRd32.exe RdrCEF.exe PID 3108 wrote to memory of 568 3108 AcroRd32.exe RdrCEF.exe PID 3108 wrote to memory of 568 3108 AcroRd32.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 1632 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 332 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 332 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 332 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 332 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 332 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 332 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 332 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 332 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 332 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 332 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 332 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 332 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 332 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 332 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 332 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 332 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 332 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 332 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 332 568 RdrCEF.exe RdrCEF.exe PID 568 wrote to memory of 332 568 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\attachment20220806-25572-1c68oie.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B54DF3BD618E152DCDE1722D5F472C7F --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=0550BFD770416C4A96B073D7C524D21F --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=0550BFD770416C4A96B073D7C524D21F --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=FBCF6D3C3780B0E4EEF50CB402929334 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=FBCF6D3C3780B0E4EEF50CB402929334 --renderer-client-id=4 --mojo-platform-channel-handle=2180 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0305EC5AE24AF655E01894B23F21B7E3 --mojo-platform-channel-handle=2552 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5A6C01CE4B9AF955669078914A4B0794 --mojo-platform-channel-handle=1828 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8930A3065273FE811E8FDA0AB935F953 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/332-135-0x0000000000000000-mapping.dmp
-
memory/568-130-0x0000000000000000-mapping.dmp
-
memory/1632-132-0x0000000000000000-mapping.dmp
-
memory/2132-145-0x0000000000000000-mapping.dmp
-
memory/2796-148-0x0000000000000000-mapping.dmp
-
memory/3312-140-0x0000000000000000-mapping.dmp
-
memory/4596-151-0x0000000000000000-mapping.dmp