Analysis
-
max time kernel
113s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2022 06:50
Behavioral task
behavioral1
Sample
Cybersecurity – Attack and Defense Strategies Infrastructure security with Red Team and Blue Team.pdf
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Cybersecurity – Attack and Defense Strategies Infrastructure security with Red Team and Blue Team.pdf
Resource
win10v2004-20220812-en
General
-
Target
Cybersecurity – Attack and Defense Strategies Infrastructure security with Red Team and Blue Team.pdf
-
Size
22.8MB
-
MD5
8986f15d3aa123e26b191496591f92f9
-
SHA1
97edf586d2b7b780a591d7406f91438dde39d577
-
SHA256
f1090bd694bb7ef1631c0df0ac9cfa4ef9731df239d9718dfd19400c4fb3a4fb
-
SHA512
4cdb093f8624c61071843238cd2b15dbb8435273a1276988727b0068095ae7113098e968f09c47e346bf2427f33a38936cf0f6894718e4b168dd38d61b5cac11
-
SSDEEP
393216:m31/RR+gs4JteNZF1/7kQI99S5My5qQMmFY0oq8sXVLjnVP/Om263EY7N0CB8AS:m3sH7kQI99SqyUQMYY3slLjV50VAS
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
AcroRd32.exepid process 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 984 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AcroRd32.exepid process 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe 984 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 984 wrote to memory of 4132 984 AcroRd32.exe RdrCEF.exe PID 984 wrote to memory of 4132 984 AcroRd32.exe RdrCEF.exe PID 984 wrote to memory of 4132 984 AcroRd32.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4692 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4428 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4428 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4428 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4428 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4428 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4428 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4428 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4428 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4428 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4428 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4428 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4428 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4428 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4428 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4428 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4428 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4428 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4428 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4428 4132 RdrCEF.exe RdrCEF.exe PID 4132 wrote to memory of 4428 4132 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Cybersecurity – Attack and Defense Strategies Infrastructure security with Red Team and Blue Team.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6DA639637515C4573BFF4BFD21D3C003 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=FC0A03C9171CBA5A6E84401AE7B01EBE --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=FC0A03C9171CBA5A6E84401AE7B01EBE --renderer-client-id=2 --mojo-platform-channel-handle=1820 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=8BAC6917D9839599BCADAF3DD5F83164 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=8BAC6917D9839599BCADAF3DD5F83164 --renderer-client-id=4 --mojo-platform-channel-handle=2172 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=39F86D3385C1841F0A0428B8A6C56AF6 --mojo-platform-channel-handle=2288 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=780EF2972AC1FD58CBBE585D697B34F3 --mojo-platform-channel-handle=2552 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=49BC87502DA4F8D0864A261F36408D04 --mojo-platform-channel-handle=1904 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1776-153-0x0000000000000000-mapping.dmp
-
memory/3920-150-0x0000000000000000-mapping.dmp
-
memory/4132-132-0x0000000000000000-mapping.dmp
-
memory/4340-145-0x0000000000000000-mapping.dmp
-
memory/4428-137-0x0000000000000000-mapping.dmp
-
memory/4692-134-0x0000000000000000-mapping.dmp
-
memory/4916-142-0x0000000000000000-mapping.dmp