Analysis
-
max time kernel
117s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2022, 18:50
Static task
static1
Behavioral task
behavioral1
Sample
attachment20220906-20308-171feoj.pdf
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
attachment20220906-20308-171feoj.pdf
Resource
win10v2004-20220812-en
6 signatures
150 seconds
General
-
Target
attachment20220906-20308-171feoj.pdf
-
Size
155KB
-
MD5
e4f7a4881be76fe1719d6f25caa15dc9
-
SHA1
76eefb0551db23bfcf2e4cfc63b379ebc7166de0
-
SHA256
59e72551a4b46cc31a5b5ae55ca37d2a3a9393c787775c435b0c3e3dc4ba9081
-
SHA512
adde627ab01007f97d98e5eea4e7b31b770b713d3e5a92d5b6bebc678e2968614db8cab3e7b6d51b9f79aac129cbdaa51f040854159fe54959ecf7d60a5b3abd
-
SSDEEP
3072:E6xF7mCaq08GQYSEvaKS/Ij6a6ttAutfpy2361mM:5XaCjYHvm/Ijl6vAuthhDM
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2396 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe 2396 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2396 wrote to memory of 4484 2396 AcroRd32.exe 86 PID 2396 wrote to memory of 4484 2396 AcroRd32.exe 86 PID 2396 wrote to memory of 4484 2396 AcroRd32.exe 86 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 1900 4484 RdrCEF.exe 89 PID 4484 wrote to memory of 4572 4484 RdrCEF.exe 90 PID 4484 wrote to memory of 4572 4484 RdrCEF.exe 90 PID 4484 wrote to memory of 4572 4484 RdrCEF.exe 90 PID 4484 wrote to memory of 4572 4484 RdrCEF.exe 90 PID 4484 wrote to memory of 4572 4484 RdrCEF.exe 90 PID 4484 wrote to memory of 4572 4484 RdrCEF.exe 90 PID 4484 wrote to memory of 4572 4484 RdrCEF.exe 90 PID 4484 wrote to memory of 4572 4484 RdrCEF.exe 90 PID 4484 wrote to memory of 4572 4484 RdrCEF.exe 90 PID 4484 wrote to memory of 4572 4484 RdrCEF.exe 90 PID 4484 wrote to memory of 4572 4484 RdrCEF.exe 90 PID 4484 wrote to memory of 4572 4484 RdrCEF.exe 90 PID 4484 wrote to memory of 4572 4484 RdrCEF.exe 90 PID 4484 wrote to memory of 4572 4484 RdrCEF.exe 90 PID 4484 wrote to memory of 4572 4484 RdrCEF.exe 90 PID 4484 wrote to memory of 4572 4484 RdrCEF.exe 90 PID 4484 wrote to memory of 4572 4484 RdrCEF.exe 90 PID 4484 wrote to memory of 4572 4484 RdrCEF.exe 90 PID 4484 wrote to memory of 4572 4484 RdrCEF.exe 90 PID 4484 wrote to memory of 4572 4484 RdrCEF.exe 90
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\attachment20220906-20308-171feoj.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6E37F16562B8FC04FDA59C2E94D7ECB8 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1900
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=9FAEC3CC24FB38017D1D78C4572843FD --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=9FAEC3CC24FB38017D1D78C4572843FD --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:13⤵PID:4572
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=9E86F1948DC4ACFE89C168DA44F10B67 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=9E86F1948DC4ACFE89C168DA44F10B67 --renderer-client-id=4 --mojo-platform-channel-handle=2304 --allow-no-sandbox-job /prefetch:13⤵PID:1496
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C9CB97744F362E9CA88C41E7C5924D29 --mojo-platform-channel-handle=2440 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2368
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0B314C630365F230E6759459ED630088 --mojo-platform-channel-handle=2672 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2036
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E2FD5F93C09434F1CCFD9937ED6CFEC8 --mojo-platform-channel-handle=2508 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1720
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1264