Analysis
-
max time kernel
319s -
max time network
502s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 01:17
Static task
static1
Behavioral task
behavioral1
Sample
data.pdf
Resource
win7-20220812-en
3 signatures
600 seconds
Behavioral task
behavioral2
Sample
data.pdf
Resource
win10v2004-20220812-en
6 signatures
600 seconds
Behavioral task
behavioral3
Sample
data.pdf
Resource
macos-20220504-en
0 signatures
600 seconds
General
-
Target
data.pdf
-
Size
201KB
-
MD5
61f85308bc4cfa27a0b49d6d3486d6a1
-
SHA1
af2f9e737853ac29cc9edaf2c3d837791acb0155
-
SHA256
61d47fbfe855446d77c7da74b0b3d23dbcee4e4e48065a397bbf09a7988f596e
-
SHA512
d8b2682d251818b4222faa7d14fc57f3353f386cbd56a3694993587f8018702c594a1a22dd1832f121f49805844d2871d8f9ec989696569af6cc5fef0fb1cee8
-
SSDEEP
6144:nDbt+BIU0MDO3Bvp1Bwm1IuAQY0LvR/cB:Dbaz1O3B31UQYQvR/o
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4004 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe 4004 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4004 wrote to memory of 4808 4004 AcroRd32.exe 79 PID 4004 wrote to memory of 4808 4004 AcroRd32.exe 79 PID 4004 wrote to memory of 4808 4004 AcroRd32.exe 79 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 4764 4808 RdrCEF.exe 82 PID 4808 wrote to memory of 384 4808 RdrCEF.exe 83 PID 4808 wrote to memory of 384 4808 RdrCEF.exe 83 PID 4808 wrote to memory of 384 4808 RdrCEF.exe 83 PID 4808 wrote to memory of 384 4808 RdrCEF.exe 83 PID 4808 wrote to memory of 384 4808 RdrCEF.exe 83 PID 4808 wrote to memory of 384 4808 RdrCEF.exe 83 PID 4808 wrote to memory of 384 4808 RdrCEF.exe 83 PID 4808 wrote to memory of 384 4808 RdrCEF.exe 83 PID 4808 wrote to memory of 384 4808 RdrCEF.exe 83 PID 4808 wrote to memory of 384 4808 RdrCEF.exe 83 PID 4808 wrote to memory of 384 4808 RdrCEF.exe 83 PID 4808 wrote to memory of 384 4808 RdrCEF.exe 83 PID 4808 wrote to memory of 384 4808 RdrCEF.exe 83 PID 4808 wrote to memory of 384 4808 RdrCEF.exe 83 PID 4808 wrote to memory of 384 4808 RdrCEF.exe 83 PID 4808 wrote to memory of 384 4808 RdrCEF.exe 83 PID 4808 wrote to memory of 384 4808 RdrCEF.exe 83 PID 4808 wrote to memory of 384 4808 RdrCEF.exe 83 PID 4808 wrote to memory of 384 4808 RdrCEF.exe 83 PID 4808 wrote to memory of 384 4808 RdrCEF.exe 83
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\data.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=684BC7B44653D15A5EA1CA213B98A847 --mojo-platform-channel-handle=1736 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4764
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=81C0970D5E2FADE1F150F22C3E3CA8F0 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=81C0970D5E2FADE1F150F22C3E3CA8F0 --renderer-client-id=2 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job /prefetch:13⤵PID:384
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E6E37CE7B97DCD7C07DF772DFE439E89 --mojo-platform-channel-handle=2300 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:536
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=62030DDFE99E5AC0A43BF4C7629FA3FE --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=62030DDFE99E5AC0A43BF4C7629FA3FE --renderer-client-id=5 --mojo-platform-channel-handle=1840 --allow-no-sandbox-job /prefetch:13⤵PID:4188
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1E4F0E3CEFC1E46FFA67A37B9B7F2505 --mojo-platform-channel-handle=1924 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3732
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3FAC89A3B30BCC903D51C20457EA9270 --mojo-platform-channel-handle=2340 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4268
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3196