Analysis
-
max time kernel
60s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2022 18:48
Behavioral task
behavioral1
Sample
attachment20220906-20109-jon277.pdf
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
attachment20220906-20109-jon277.pdf
Resource
win10v2004-20220901-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
attachment20220906-20109-jon277.pdf
-
Size
14KB
-
MD5
dafd80ae261beb6b4663488455bcdcb0
-
SHA1
6b093146d8e5a411ec643ec68b7bf6789d7f8c92
-
SHA256
8c24a7e1465b461afccec7776e6eab96de7ba3690817fb46dc7e4c8e22b3648c
-
SHA512
ab8c5320e34fe30f0f70cdc90681dd288fc756ae17d3596b8f9a38297b5e6758e2e4a9681306dbf0f30813a3a40e8de231be1ff6c56bbdbb30d48e10a2c9ea7c
-
SSDEEP
384:iG04CKohG+cC47nr14L49dLeeR9Lvun5j:F04CKQF/Uri6jun5j
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3628 AcroRd32.exe 3628 AcroRd32.exe 3628 AcroRd32.exe 3628 AcroRd32.exe 3628 AcroRd32.exe 3628 AcroRd32.exe 3628 AcroRd32.exe 3628 AcroRd32.exe 3628 AcroRd32.exe 3628 AcroRd32.exe 3628 AcroRd32.exe 3628 AcroRd32.exe 3628 AcroRd32.exe 3628 AcroRd32.exe 3628 AcroRd32.exe 3628 AcroRd32.exe 3628 AcroRd32.exe 3628 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3628 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3628 AcroRd32.exe 3628 AcroRd32.exe 3628 AcroRd32.exe 3628 AcroRd32.exe 3628 AcroRd32.exe 3628 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3628 wrote to memory of 4356 3628 AcroRd32.exe 83 PID 3628 wrote to memory of 4356 3628 AcroRd32.exe 83 PID 3628 wrote to memory of 4356 3628 AcroRd32.exe 83 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2208 4356 RdrCEF.exe 84 PID 4356 wrote to memory of 2656 4356 RdrCEF.exe 85 PID 4356 wrote to memory of 2656 4356 RdrCEF.exe 85 PID 4356 wrote to memory of 2656 4356 RdrCEF.exe 85 PID 4356 wrote to memory of 2656 4356 RdrCEF.exe 85 PID 4356 wrote to memory of 2656 4356 RdrCEF.exe 85 PID 4356 wrote to memory of 2656 4356 RdrCEF.exe 85 PID 4356 wrote to memory of 2656 4356 RdrCEF.exe 85 PID 4356 wrote to memory of 2656 4356 RdrCEF.exe 85 PID 4356 wrote to memory of 2656 4356 RdrCEF.exe 85 PID 4356 wrote to memory of 2656 4356 RdrCEF.exe 85 PID 4356 wrote to memory of 2656 4356 RdrCEF.exe 85 PID 4356 wrote to memory of 2656 4356 RdrCEF.exe 85 PID 4356 wrote to memory of 2656 4356 RdrCEF.exe 85 PID 4356 wrote to memory of 2656 4356 RdrCEF.exe 85 PID 4356 wrote to memory of 2656 4356 RdrCEF.exe 85 PID 4356 wrote to memory of 2656 4356 RdrCEF.exe 85 PID 4356 wrote to memory of 2656 4356 RdrCEF.exe 85 PID 4356 wrote to memory of 2656 4356 RdrCEF.exe 85 PID 4356 wrote to memory of 2656 4356 RdrCEF.exe 85 PID 4356 wrote to memory of 2656 4356 RdrCEF.exe 85
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\attachment20220906-20109-jon277.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=CBCD29A44AA0653EDCCF092643032E48 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2208
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=4B7C509EDF781E5713F3055DA129392B --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=4B7C509EDF781E5713F3055DA129392B --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:13⤵PID:2656
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=198E41EF120A99DD96F5C67A80A18C49 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=198E41EF120A99DD96F5C67A80A18C49 --renderer-client-id=4 --mojo-platform-channel-handle=2180 --allow-no-sandbox-job /prefetch:13⤵PID:1748
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=27496F8E59595BB6724569DEAC8DB2B2 --mojo-platform-channel-handle=2428 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4468
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1902D637F4DA394A4142B797AE4AFC5B --mojo-platform-channel-handle=1932 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:636
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E1D6C499EA27C988BAF729A656B03767 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2120
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3712