Analysis
-
max time kernel
80s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2022 11:08
Behavioral task
behavioral1
Sample
Flag 'B' - Dos and Don'ts for Procurement under LOCs.pdf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Flag 'B' - Dos and Don'ts for Procurement under LOCs.pdf
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Flag 'C' - Handbook on Lines of Credit.pdf
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Flag 'C' - Handbook on Lines of Credit.pdf
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
Flag-'A'-LOC_flowcharts-New.doc.js
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
Flag-'A'-LOC_flowcharts-New.doc.js
Resource
win10v2004-20220812-en
General
-
Target
Flag 'B' - Dos and Don'ts for Procurement under LOCs.pdf
-
Size
142KB
-
MD5
ad79e90f917822ca94110245d5219649
-
SHA1
4d11f46d736df3d64dee85c3f2723bf17a3d4606
-
SHA256
fa447e103d3583e9d76155c3a469b3afa2ee297d6c82ebe558d4da63c5c6a2cb
-
SHA512
19be5a65809f6d3769aae3dbf3ae16dffc10a25371510f4920adcb9ec3e9d302a453feec6bc9ba6a8930f003a2867d135afd431d0116616f17f49c34976e64ad
-
SSDEEP
3072:Rv7IW8bfNCKkW4/YM/dBirfmnJbTOlAdjtoZqqfaH9:RcxVCrXcreFKAdj+Zqv
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
AcroRd32.exepid process 4992 AcroRd32.exe 4992 AcroRd32.exe 4992 AcroRd32.exe 4992 AcroRd32.exe 4992 AcroRd32.exe 4992 AcroRd32.exe 4992 AcroRd32.exe 4992 AcroRd32.exe 4992 AcroRd32.exe 4992 AcroRd32.exe 4992 AcroRd32.exe 4992 AcroRd32.exe 4992 AcroRd32.exe 4992 AcroRd32.exe 4992 AcroRd32.exe 4992 AcroRd32.exe 4992 AcroRd32.exe 4992 AcroRd32.exe 4992 AcroRd32.exe 4992 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 4992 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AcroRd32.exepid process 4992 AcroRd32.exe 4992 AcroRd32.exe 4992 AcroRd32.exe 4992 AcroRd32.exe 4992 AcroRd32.exe 4992 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 4992 wrote to memory of 1608 4992 AcroRd32.exe RdrCEF.exe PID 4992 wrote to memory of 1608 4992 AcroRd32.exe RdrCEF.exe PID 4992 wrote to memory of 1608 4992 AcroRd32.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 964 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 1940 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 1940 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 1940 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 1940 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 1940 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 1940 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 1940 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 1940 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 1940 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 1940 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 1940 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 1940 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 1940 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 1940 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 1940 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 1940 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 1940 1608 RdrCEF.exe RdrCEF.exe PID 1608 wrote to memory of 1940 1608 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Flag 'B' - Dos and Don'ts for Procurement under LOCs.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=D764073B0F1A48060287401A68C149B4 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=D764073B0F1A48060287401A68C149B4 --renderer-client-id=2 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job /prefetch:13⤵PID:964
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2CE09FF9C38BDD64A0287BB2FA802610 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1940
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=9D1776AB04B6444B551D786B69BD8F68 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=9D1776AB04B6444B551D786B69BD8F68 --renderer-client-id=4 --mojo-platform-channel-handle=2320 --allow-no-sandbox-job /prefetch:13⤵PID:4036
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0A537350411C06AD7F8B3B3505A33F51 --mojo-platform-channel-handle=2448 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:116
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=DF5C9CA1E1BD9E232C6E0EB0BBA41052 --mojo-platform-channel-handle=2136 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3564
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E9248A350FEE3DAA116FBC7242210B95 --mojo-platform-channel-handle=2460 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2248
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3292
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/116-146-0x0000000000000000-mapping.dmp
-
memory/964-134-0x0000000000000000-mapping.dmp
-
memory/1608-132-0x0000000000000000-mapping.dmp
-
memory/1940-138-0x0000000000000000-mapping.dmp
-
memory/2248-153-0x0000000000000000-mapping.dmp
-
memory/3564-150-0x0000000000000000-mapping.dmp
-
memory/4036-142-0x0000000000000000-mapping.dmp