Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2022 06:33
Behavioral task
behavioral1
Sample
Incident Response Techniques for Ransomware Attacks Understand modern ransomware attacks ( etc.) (z-lib.org).pdf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Incident Response Techniques for Ransomware Attacks Understand modern ransomware attacks ( etc.) (z-lib.org).pdf
Resource
win10v2004-20220812-en
General
-
Target
Incident Response Techniques for Ransomware Attacks Understand modern ransomware attacks ( etc.) (z-lib.org).pdf
-
Size
12.1MB
-
MD5
c51ade4cdac56d0c98f392e29c1a226f
-
SHA1
d6265b5ec7130c0473f73b0ca14a5d21939d4420
-
SHA256
a6c34199052ba042237905ae228de55fb6fc445a9c1a951fcdec0e4c98c44d03
-
SHA512
da16868226c38304cff12c808a157fbc5bd5e816aeae01087faaa1d164487c111988d2373e6921e436eb19b3d9040c3aaea714499e57e4d629df23c7c3a68910
-
SSDEEP
393216:vfuGGSZVob88r888888888888X88Z8LzGSgKdp+XJC0klB:vmGtZs88r888888888888X88Z8LSAj+U
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
AcroRd32.exepid process 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 1648 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AcroRd32.exepid process 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe 1648 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 1648 wrote to memory of 4848 1648 AcroRd32.exe RdrCEF.exe PID 1648 wrote to memory of 4848 1648 AcroRd32.exe RdrCEF.exe PID 1648 wrote to memory of 4848 1648 AcroRd32.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 1240 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 4192 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 4192 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 4192 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 4192 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 4192 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 4192 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 4192 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 4192 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 4192 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 4192 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 4192 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 4192 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 4192 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 4192 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 4192 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 4192 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 4192 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 4192 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 4192 4848 RdrCEF.exe RdrCEF.exe PID 4848 wrote to memory of 4192 4848 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Incident Response Techniques for Ransomware Attacks Understand modern ransomware attacks ( etc.) (z-lib.org).pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BECAA4B4B3E82749E43D74E1987CD833 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=7E8F9BF3215183A8C97D2A29287C52FC --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=7E8F9BF3215183A8C97D2A29287C52FC --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=ED26DBDF103AE674CBA7583ECF8FFFFF --mojo-platform-channel-handle=2192 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=677A2013A5EAE837A2DF6FAA04C170FD --mojo-platform-channel-handle=2332 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=E1B9BA05A0293FBC5782959A996E2443 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=E1B9BA05A0293FBC5782959A996E2443 --renderer-client-id=5 --mojo-platform-channel-handle=2320 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E5C67779ED5032E02CE4C8D272135028 --mojo-platform-channel-handle=2204 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1240-134-0x0000000000000000-mapping.dmp
-
memory/1924-153-0x0000000000000000-mapping.dmp
-
memory/3576-148-0x0000000000000000-mapping.dmp
-
memory/3592-145-0x0000000000000000-mapping.dmp
-
memory/4192-137-0x0000000000000000-mapping.dmp
-
memory/4636-142-0x0000000000000000-mapping.dmp
-
memory/4848-132-0x0000000000000000-mapping.dmp