Overview
overview
4Static
static
4练习参�...aw.xml
windows7-x64
1练习参�...aw.xml
windows10-2004-x64
1练习参�...ne.xml
windows7-x64
1练习参�...ne.xml
windows10-2004-x64
1课时7/�...��.exe
windows7-x64
1课时7/�...��.exe
windows10-2004-x64
1课时7/�...��.pdf
windows7-x64
1课时7/�...��.pdf
windows10-2004-x64
1课时7/�...��.pdf
windows7-x64
1课时7/�...��.pdf
windows10-2004-x64
1Analysis
-
max time kernel
94s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 07:03
Behavioral task
behavioral1
Sample
练习参考程序/练习6/clickDraw/clickDraw.xml
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
练习参考程序/练习6/clickDraw/clickDraw.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
练习参考程序/练习6/dataEngine/dataEngine.xml
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
练习参考程序/练习6/dataEngine/dataEngine.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
课时7/练习7/ddraw-演示.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
课时7/练习7/ddraw-演示.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
课时7/练习7/练习7要求.pdf
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
课时7/练习7/练习7要求.pdf
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
课时7/课件7-绘图和图片控件.pdf
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
课时7/课件7-绘图和图片控件.pdf
Resource
win10v2004-20220901-en
General
-
Target
课时7/练习7/练习7要求.pdf
-
Size
589KB
-
MD5
e9fc1127fbd0b9e350df802f4409a5a2
-
SHA1
8685badcccb2a08cb9101b4675c9f72ec7e97350
-
SHA256
77bac327fc68e3cd636e64f378ef8051b4fb339fcad021a0ecea7c9870bd8f1e
-
SHA512
eed740aefbe7dfad8246cfc6223e5d3c1a1a4e93e699b278394527fa6f06fd5ee6fff7d4e27681e3adbd713347c38a651f33b6ede045169ca68564ce9602a354
-
SSDEEP
12288:eJcvPrZAz6/C9wMTKNjMz8j+QAaddMux4JRw/ZvO1ZX0:scHyH9vclQux4OvME
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
AcroRd32.exepid process 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 1372 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AcroRd32.exepid process 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe 1372 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 1372 wrote to memory of 3188 1372 AcroRd32.exe RdrCEF.exe PID 1372 wrote to memory of 3188 1372 AcroRd32.exe RdrCEF.exe PID 1372 wrote to memory of 3188 1372 AcroRd32.exe RdrCEF.exe PID 1372 wrote to memory of 4756 1372 AcroRd32.exe RdrCEF.exe PID 1372 wrote to memory of 4756 1372 AcroRd32.exe RdrCEF.exe PID 1372 wrote to memory of 4756 1372 AcroRd32.exe RdrCEF.exe PID 1372 wrote to memory of 4972 1372 AcroRd32.exe RdrCEF.exe PID 1372 wrote to memory of 4972 1372 AcroRd32.exe RdrCEF.exe PID 1372 wrote to memory of 4972 1372 AcroRd32.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 5032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 3032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 3032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 3032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 3032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 3032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 3032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 3032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 3032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 3032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 3032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 3032 4972 RdrCEF.exe RdrCEF.exe PID 4972 wrote to memory of 3032 4972 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\课时7\练习7\练习7要求.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:3188
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:4756
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=692D8773F1A441CEE2D52842A632BEF7 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=692D8773F1A441CEE2D52842A632BEF7 --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:13⤵PID:5032
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D244BD9F04FB074260A7B49F4A468D80 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3032
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=15B3B07B6A14E2FC532F26B523A95ABE --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=15B3B07B6A14E2FC532F26B523A95ABE --renderer-client-id=4 --mojo-platform-channel-handle=2152 --allow-no-sandbox-job /prefetch:13⤵PID:3020
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=DCA61355500B6F97817E98F738C5B86B --mojo-platform-channel-handle=2548 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4556
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7040E1471ABD5BC36A11BA15BCEAD03E --mojo-platform-channel-handle=2004 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2308
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1CC8D7BB1B001BB29232DEEF58FBB7C9 --mojo-platform-channel-handle=2568 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:480
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4620