Analysis
-
max time kernel
82s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2022 15:38
Static task
static1
Behavioral task
behavioral1
Sample
attachment20220906-26915-eawpd4.pdf
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
attachment20220906-26915-eawpd4.pdf
Resource
win10v2004-20220901-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
attachment20220906-26915-eawpd4.pdf
-
Size
29KB
-
MD5
8c6e8da88ee5ff44042e73168ad0c03e
-
SHA1
0362dafdc15751a0c0265a941c0a84446608683a
-
SHA256
86e350202f46b69922f8b32e2f6570a4d0d48e1426738df00e38dcbf0c48258f
-
SHA512
861e44245279160f15b4b00d264595e315809f1bd4fe8b9eb1a83de601bcf2246d4ea4eb139c47d74e82aaeb39ad04bf2044a6cae1eb2a6ffff39c252f05df7b
-
SSDEEP
768:Z1EWgJOJWPK2Yeay/O7kZvFWnmCbmhUEwa:Z2fwWPpa+O7kpFWnHbmhdwa
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1884 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe 1884 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1884 wrote to memory of 4516 1884 AcroRd32.exe 83 PID 1884 wrote to memory of 4516 1884 AcroRd32.exe 83 PID 1884 wrote to memory of 4516 1884 AcroRd32.exe 83 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 672 4516 RdrCEF.exe 84 PID 4516 wrote to memory of 2208 4516 RdrCEF.exe 85 PID 4516 wrote to memory of 2208 4516 RdrCEF.exe 85 PID 4516 wrote to memory of 2208 4516 RdrCEF.exe 85 PID 4516 wrote to memory of 2208 4516 RdrCEF.exe 85 PID 4516 wrote to memory of 2208 4516 RdrCEF.exe 85 PID 4516 wrote to memory of 2208 4516 RdrCEF.exe 85 PID 4516 wrote to memory of 2208 4516 RdrCEF.exe 85 PID 4516 wrote to memory of 2208 4516 RdrCEF.exe 85 PID 4516 wrote to memory of 2208 4516 RdrCEF.exe 85 PID 4516 wrote to memory of 2208 4516 RdrCEF.exe 85 PID 4516 wrote to memory of 2208 4516 RdrCEF.exe 85 PID 4516 wrote to memory of 2208 4516 RdrCEF.exe 85 PID 4516 wrote to memory of 2208 4516 RdrCEF.exe 85 PID 4516 wrote to memory of 2208 4516 RdrCEF.exe 85 PID 4516 wrote to memory of 2208 4516 RdrCEF.exe 85 PID 4516 wrote to memory of 2208 4516 RdrCEF.exe 85 PID 4516 wrote to memory of 2208 4516 RdrCEF.exe 85 PID 4516 wrote to memory of 2208 4516 RdrCEF.exe 85
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\attachment20220906-26915-eawpd4.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=B573BE40705A042D6E22082FBDE40F77 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=B573BE40705A042D6E22082FBDE40F77 --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:13⤵PID:672
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A3534C66482B5C9C1F37266F8A733020 --mojo-platform-channel-handle=1816 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2208
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=48BF3B6FDF83A37847049B89B27F1FD3 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=48BF3B6FDF83A37847049B89B27F1FD3 --renderer-client-id=4 --mojo-platform-channel-handle=2168 --allow-no-sandbox-job /prefetch:13⤵PID:2964
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8C5CCAB654D62C444ED31E5543169530 --mojo-platform-channel-handle=2588 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4412
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6AA4980FD360AD02E0D3CCC12F804222 --mojo-platform-channel-handle=2608 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4968
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=361FDE0FE62DAEADB612BE52FDF7225A --mojo-platform-channel-handle=2044 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2456
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4296