Analysis
-
max time kernel
61s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2022 02:46
Behavioral task
behavioral1
Sample
Tickets_boulvar.pdf
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
Tickets_boulvar.pdf
Resource
win10v2004-20220812-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
Tickets_boulvar.pdf
-
Size
46KB
-
MD5
9431eae3695eaae0842818524576f2d7
-
SHA1
0136382b04712ee683f4f34936223c5c6b353a0c
-
SHA256
fdf31dc4a95e2b2f06984166c1bdce3672f66a2f3bd09818366900227036a403
-
SHA512
c9d3880d9397469ff559d23907a42addea5578b9e1c608b701aab934984f99137d89f10cad1a56f3ca8e92b6e054f3369be0a173cfc7bd0aad39dee7fde7a9c4
-
SSDEEP
768:1ng9hNTGUeQa7JVUlgQXy6PPmTXbamif4hwfsP6/DlcL7CzNzxYZOeyo0/oJLS4m:+JRPRd4wEaNUyo0/C3i
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
AcroRd32.exepid process 396 AcroRd32.exe 396 AcroRd32.exe 396 AcroRd32.exe 396 AcroRd32.exe 396 AcroRd32.exe 396 AcroRd32.exe 396 AcroRd32.exe 396 AcroRd32.exe 396 AcroRd32.exe 396 AcroRd32.exe 396 AcroRd32.exe 396 AcroRd32.exe 396 AcroRd32.exe 396 AcroRd32.exe 396 AcroRd32.exe 396 AcroRd32.exe 396 AcroRd32.exe 396 AcroRd32.exe 396 AcroRd32.exe 396 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 396 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AcroRd32.exepid process 396 AcroRd32.exe 396 AcroRd32.exe 396 AcroRd32.exe 396 AcroRd32.exe 396 AcroRd32.exe 396 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 396 wrote to memory of 4208 396 AcroRd32.exe RdrCEF.exe PID 396 wrote to memory of 4208 396 AcroRd32.exe RdrCEF.exe PID 396 wrote to memory of 4208 396 AcroRd32.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 4600 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 3508 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 3508 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 3508 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 3508 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 3508 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 3508 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 3508 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 3508 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 3508 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 3508 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 3508 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 3508 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 3508 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 3508 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 3508 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 3508 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 3508 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 3508 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 3508 4208 RdrCEF.exe RdrCEF.exe PID 4208 wrote to memory of 3508 4208 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Tickets_boulvar.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9DE000BD16F74DE1DF0EBDA3CAA19DC0 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=00E70E89603360F17BA86D5FBA08AEE5 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=00E70E89603360F17BA86D5FBA08AEE5 --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=ACD66CBF47BFDE0626AE1960F0FCA805 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=ACD66CBF47BFDE0626AE1960F0FCA805 --renderer-client-id=4 --mojo-platform-channel-handle=2172 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1982FD76A29553F77E2BE5CA52C121A3 --mojo-platform-channel-handle=2212 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=56C87710C8197B69B4D193ED06E84B5F --mojo-platform-channel-handle=2552 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=467BD43A9B8C171CF4C1CA3F04E745C6 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1392-153-0x0000000000000000-mapping.dmp
-
memory/3216-147-0x0000000000000000-mapping.dmp
-
memory/3508-137-0x0000000000000000-mapping.dmp
-
memory/3672-142-0x0000000000000000-mapping.dmp
-
memory/4140-150-0x0000000000000000-mapping.dmp
-
memory/4208-132-0x0000000000000000-mapping.dmp
-
memory/4600-134-0x0000000000000000-mapping.dmp