Analysis
-
max time kernel
55s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2022, 16:15
Static task
static1
Behavioral task
behavioral1
Sample
8d0460a55fa86c229311a3491c11a641c61c78105e49334c18fe30b5ba8339c2.pdf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8d0460a55fa86c229311a3491c11a641c61c78105e49334c18fe30b5ba8339c2.pdf
Resource
win10v2004-20220812-en
General
-
Target
8d0460a55fa86c229311a3491c11a641c61c78105e49334c18fe30b5ba8339c2.pdf
-
Size
3.6MB
-
MD5
1b7cb8d843191c5707d6087179658a1c
-
SHA1
0beed359d4a3c9b26aca6d829127e96364d70bad
-
SHA256
8d0460a55fa86c229311a3491c11a641c61c78105e49334c18fe30b5ba8339c2
-
SHA512
3118498279a97aca266b087ebde3b49251da09575a2d53b746337c0abf13a798a38e20d02461fb3abd84d6304861e579187626641e35b0d5b266f2b481274745
-
SSDEEP
98304:GMPNScFziCsc/laAlPi3rfTOgUHSoAqu7VWQ:GONC6laAl02byoAz7VWQ
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 968 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe 968 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 968 wrote to memory of 4672 968 AcroRd32.exe 85 PID 968 wrote to memory of 4672 968 AcroRd32.exe 85 PID 968 wrote to memory of 4672 968 AcroRd32.exe 85 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 4348 4672 RdrCEF.exe 88 PID 4672 wrote to memory of 628 4672 RdrCEF.exe 89 PID 4672 wrote to memory of 628 4672 RdrCEF.exe 89 PID 4672 wrote to memory of 628 4672 RdrCEF.exe 89 PID 4672 wrote to memory of 628 4672 RdrCEF.exe 89 PID 4672 wrote to memory of 628 4672 RdrCEF.exe 89 PID 4672 wrote to memory of 628 4672 RdrCEF.exe 89 PID 4672 wrote to memory of 628 4672 RdrCEF.exe 89 PID 4672 wrote to memory of 628 4672 RdrCEF.exe 89 PID 4672 wrote to memory of 628 4672 RdrCEF.exe 89 PID 4672 wrote to memory of 628 4672 RdrCEF.exe 89 PID 4672 wrote to memory of 628 4672 RdrCEF.exe 89 PID 4672 wrote to memory of 628 4672 RdrCEF.exe 89 PID 4672 wrote to memory of 628 4672 RdrCEF.exe 89 PID 4672 wrote to memory of 628 4672 RdrCEF.exe 89 PID 4672 wrote to memory of 628 4672 RdrCEF.exe 89 PID 4672 wrote to memory of 628 4672 RdrCEF.exe 89 PID 4672 wrote to memory of 628 4672 RdrCEF.exe 89 PID 4672 wrote to memory of 628 4672 RdrCEF.exe 89 PID 4672 wrote to memory of 628 4672 RdrCEF.exe 89 PID 4672 wrote to memory of 628 4672 RdrCEF.exe 89
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\8d0460a55fa86c229311a3491c11a641c61c78105e49334c18fe30b5ba8339c2.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6B9893D6475A590875148FA60952C8CB --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4348
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=E46AC91F79A2425E85DE7DF7078D1595 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=E46AC91F79A2425E85DE7DF7078D1595 --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:13⤵PID:628
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B535B72ACAA77BF2C59D41CB00C7CD93 --mojo-platform-channel-handle=2328 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4572
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C6656978C76220BD4B9DE7CBB4F40449 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C6656978C76220BD4B9DE7CBB4F40449 --renderer-client-id=5 --mojo-platform-channel-handle=1864 --allow-no-sandbox-job /prefetch:13⤵PID:3484
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D62E1C642F4557FCCD194A591E056A01 --mojo-platform-channel-handle=2560 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1208
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D129EC02067C4DFFEB668F9D2A99C59A --mojo-platform-channel-handle=2424 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3784
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2240