Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2022, 13:10
Behavioral task
behavioral1
Sample
Allied eTrainer Guide for Returning Students 2022.pdf
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Allied eTrainer Guide for Returning Students 2022.pdf
Resource
win10v2004-20220812-en
General
-
Target
Allied eTrainer Guide for Returning Students 2022.pdf
-
Size
596KB
-
MD5
545c669a0642070d8d22e8f6a11ef39f
-
SHA1
d3935acf9bb74aa90eaa730e2193baac87e0e022
-
SHA256
f66f1d286d3ee8b4ceee306793b33fce96778221ed5a7db177ece511b331cea2
-
SHA512
00fb71499f8fe826ad2b90ff275f31b0ff8a6747db803846f1447fded9f8bb9869cabb7e08b45fc0d061f269dc23dcd537bc9254feefa9303a4cbea42763bae1
-
SSDEEP
12288:dQjUjsD89atyNErgI0sVK2S1UeAAAAAAAAE9y65rD1DDbffffqffmfffEffffQFf:dQhD6ygErZ0sVnS1U99dRDvrJZwabpnB
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4848 AcroRd32.exe 4848 AcroRd32.exe 4848 AcroRd32.exe 4848 AcroRd32.exe 4848 AcroRd32.exe 4848 AcroRd32.exe 4848 AcroRd32.exe 4848 AcroRd32.exe 4848 AcroRd32.exe 4848 AcroRd32.exe 4848 AcroRd32.exe 4848 AcroRd32.exe 4848 AcroRd32.exe 4848 AcroRd32.exe 4848 AcroRd32.exe 4848 AcroRd32.exe 4848 AcroRd32.exe 4848 AcroRd32.exe 4848 AcroRd32.exe 4848 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4848 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4848 AcroRd32.exe 4848 AcroRd32.exe 4848 AcroRd32.exe 4848 AcroRd32.exe 4848 AcroRd32.exe 4848 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4848 wrote to memory of 4132 4848 AcroRd32.exe 86 PID 4848 wrote to memory of 4132 4848 AcroRd32.exe 86 PID 4848 wrote to memory of 4132 4848 AcroRd32.exe 86 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 4856 4132 RdrCEF.exe 90 PID 4132 wrote to memory of 3116 4132 RdrCEF.exe 91 PID 4132 wrote to memory of 3116 4132 RdrCEF.exe 91 PID 4132 wrote to memory of 3116 4132 RdrCEF.exe 91 PID 4132 wrote to memory of 3116 4132 RdrCEF.exe 91 PID 4132 wrote to memory of 3116 4132 RdrCEF.exe 91 PID 4132 wrote to memory of 3116 4132 RdrCEF.exe 91 PID 4132 wrote to memory of 3116 4132 RdrCEF.exe 91 PID 4132 wrote to memory of 3116 4132 RdrCEF.exe 91 PID 4132 wrote to memory of 3116 4132 RdrCEF.exe 91 PID 4132 wrote to memory of 3116 4132 RdrCEF.exe 91 PID 4132 wrote to memory of 3116 4132 RdrCEF.exe 91 PID 4132 wrote to memory of 3116 4132 RdrCEF.exe 91 PID 4132 wrote to memory of 3116 4132 RdrCEF.exe 91 PID 4132 wrote to memory of 3116 4132 RdrCEF.exe 91 PID 4132 wrote to memory of 3116 4132 RdrCEF.exe 91 PID 4132 wrote to memory of 3116 4132 RdrCEF.exe 91 PID 4132 wrote to memory of 3116 4132 RdrCEF.exe 91 PID 4132 wrote to memory of 3116 4132 RdrCEF.exe 91 PID 4132 wrote to memory of 3116 4132 RdrCEF.exe 91 PID 4132 wrote to memory of 3116 4132 RdrCEF.exe 91
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Allied eTrainer Guide for Returning Students 2022.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FFAE491F35954061B009748265FEB010 --mojo-platform-channel-handle=1736 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4856
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=8961609B11954D142913C65486331B64 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=8961609B11954D142913C65486331B64 --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:13⤵PID:3116
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=90A7CCA09FABAA8D399424E7823AAC7A --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=90A7CCA09FABAA8D399424E7823AAC7A --renderer-client-id=4 --mojo-platform-channel-handle=2172 --allow-no-sandbox-job /prefetch:13⤵PID:1424
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C7DF692B5C4027AD145EF9DAEEFCA3CE --mojo-platform-channel-handle=2564 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3432
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=AA1B206B48CE3B977621CFE9A6182F16 --mojo-platform-channel-handle=1720 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2368
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A44200049D42ADDD2EF6D2E3E450CB7D --mojo-platform-channel-handle=2576 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4260
-
-