Analysis
-
max time kernel
76s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2022, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
de3866e537408f26b1f8066673c95bdea3267ee9abeef0ec6ac826509b0eb31b.pdf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
de3866e537408f26b1f8066673c95bdea3267ee9abeef0ec6ac826509b0eb31b.pdf
Resource
win10v2004-20220901-en
General
-
Target
de3866e537408f26b1f8066673c95bdea3267ee9abeef0ec6ac826509b0eb31b.pdf
-
Size
1.4MB
-
MD5
e442cc857802ddf2cc09f4c22402ca6d
-
SHA1
2dad822aaa261bca21e4a35a4d8cfd8c837b9591
-
SHA256
de3866e537408f26b1f8066673c95bdea3267ee9abeef0ec6ac826509b0eb31b
-
SHA512
0e3aa69e0eda58f02b7bd2521f19e45d04d7c15fd427d8740db1fa6f499994dbcba8433ca6d41d1a76f4933f6236ee237b041dbe71695cfc13fad72a4453c9bf
-
SSDEEP
24576:Bk9xhaUuYWyRDfyRi9cmTrkooSdXp8GU+0FYiefqtXYhns1Vqk/OQ:q9LGRi9cmfkooSlbPwohs1wkl
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4900 AcroRd32.exe 4900 AcroRd32.exe 4900 AcroRd32.exe 4900 AcroRd32.exe 4900 AcroRd32.exe 4900 AcroRd32.exe 4900 AcroRd32.exe 4900 AcroRd32.exe 4900 AcroRd32.exe 4900 AcroRd32.exe 4900 AcroRd32.exe 4900 AcroRd32.exe 4900 AcroRd32.exe 4900 AcroRd32.exe 4900 AcroRd32.exe 4900 AcroRd32.exe 4900 AcroRd32.exe 4900 AcroRd32.exe 4900 AcroRd32.exe 4900 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4900 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4900 AcroRd32.exe 4900 AcroRd32.exe 4900 AcroRd32.exe 4900 AcroRd32.exe 4900 AcroRd32.exe 4900 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4900 wrote to memory of 5088 4900 AcroRd32.exe 85 PID 4900 wrote to memory of 5088 4900 AcroRd32.exe 85 PID 4900 wrote to memory of 5088 4900 AcroRd32.exe 85 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 2404 5088 RdrCEF.exe 87 PID 5088 wrote to memory of 4868 5088 RdrCEF.exe 88 PID 5088 wrote to memory of 4868 5088 RdrCEF.exe 88 PID 5088 wrote to memory of 4868 5088 RdrCEF.exe 88 PID 5088 wrote to memory of 4868 5088 RdrCEF.exe 88 PID 5088 wrote to memory of 4868 5088 RdrCEF.exe 88 PID 5088 wrote to memory of 4868 5088 RdrCEF.exe 88 PID 5088 wrote to memory of 4868 5088 RdrCEF.exe 88 PID 5088 wrote to memory of 4868 5088 RdrCEF.exe 88 PID 5088 wrote to memory of 4868 5088 RdrCEF.exe 88 PID 5088 wrote to memory of 4868 5088 RdrCEF.exe 88 PID 5088 wrote to memory of 4868 5088 RdrCEF.exe 88 PID 5088 wrote to memory of 4868 5088 RdrCEF.exe 88 PID 5088 wrote to memory of 4868 5088 RdrCEF.exe 88 PID 5088 wrote to memory of 4868 5088 RdrCEF.exe 88 PID 5088 wrote to memory of 4868 5088 RdrCEF.exe 88 PID 5088 wrote to memory of 4868 5088 RdrCEF.exe 88 PID 5088 wrote to memory of 4868 5088 RdrCEF.exe 88 PID 5088 wrote to memory of 4868 5088 RdrCEF.exe 88 PID 5088 wrote to memory of 4868 5088 RdrCEF.exe 88 PID 5088 wrote to memory of 4868 5088 RdrCEF.exe 88
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\de3866e537408f26b1f8066673c95bdea3267ee9abeef0ec6ac826509b0eb31b.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=CDD8A493ED8DD686115629D661F74E67 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2404
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=9BE077B452FC5793018EFE1E2F98EE61 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=9BE077B452FC5793018EFE1E2F98EE61 --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:13⤵PID:4868
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B6B34188F0A26AC6A778815229920D6E --mojo-platform-channel-handle=2192 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1944
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=AA73BD0B58588BFDCD1DA04B026A3756 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=AA73BD0B58588BFDCD1DA04B026A3756 --renderer-client-id=5 --mojo-platform-channel-handle=2420 --allow-no-sandbox-job /prefetch:13⤵PID:4288
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=DFD616C39A854DC2DF680AC13F80BB4F --mojo-platform-channel-handle=2584 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4368
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=239F05EA4442899DC54DFB70B7034038 --mojo-platform-channel-handle=2020 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1712
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:536