Analysis
-
max time kernel
80s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2022 21:00
Behavioral task
behavioral1
Sample
CISP 知识体系大纲(CISE&CISO)-V4.1.pdf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
CISP 知识体系大纲(CISE&CISO)-V4.1.pdf
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
CISP培训手册.pdf
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
CISP培训手册.pdf
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
CISP试题及答案(515多题整理版).docx
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
CISP试题及答案(515多题整理版).docx
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
cisp试题700道(带答案).pdf
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
cisp试题700道(带答案).pdf
Resource
win10v2004-20220812-en
General
-
Target
CISP 知识体系大纲(CISE&CISO)-V4.1.pdf
-
Size
548KB
-
MD5
a423574a934733bb80cc7ba0323bce23
-
SHA1
ec317437dc81d58a09dbb53ec365a1ce60ce32b8
-
SHA256
d9b95ef4642ff20e5caaba98a386e3bf52caa7a74cca5096d520c7e1f130a092
-
SHA512
d7aebee2340079096d2f8a4f5a4bde3ef49c41841096dfe78428e230e3acbdff13df4d4621c4fb233027108343dbe470547249867b31e1ada8964237a5f771f1
-
SSDEEP
12288:2Muk4B48bsy93jxFlKKCAQvek5JlvCwL5tmVm:/dSbT3jxbKhAQnvhX
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
AcroRd32.exepid process 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 4888 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AcroRd32.exepid process 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe 4888 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 4888 wrote to memory of 3068 4888 AcroRd32.exe RdrCEF.exe PID 4888 wrote to memory of 3068 4888 AcroRd32.exe RdrCEF.exe PID 4888 wrote to memory of 3068 4888 AcroRd32.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3172 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3576 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3576 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3576 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3576 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3576 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3576 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3576 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3576 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3576 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3576 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3576 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3576 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3576 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3576 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3576 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3576 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3576 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3576 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3576 3068 RdrCEF.exe RdrCEF.exe PID 3068 wrote to memory of 3576 3068 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\CISP 知识体系大纲(CISE&CISO)-V4.1.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F77ED9B6242B30D8BB874EF9F1BA50BB --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=66E30CE6CF215BEE3405B06F90A7B1B2 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=66E30CE6CF215BEE3405B06F90A7B1B2 --renderer-client-id=2 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8369675D3A359624CE1A6895FCBA948F --mojo-platform-channel-handle=2292 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=BC7B477C15E2A6B3BD702740815DB352 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=BC7B477C15E2A6B3BD702740815DB352 --renderer-client-id=5 --mojo-platform-channel-handle=2108 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BD5A49BE130B52B36C856F30F4C4CAC3 --mojo-platform-channel-handle=2668 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D0B930F7C003A00DEB23C28AA126D533 --mojo-platform-channel-handle=2812 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1488-145-0x0000000000000000-mapping.dmp
-
memory/3068-132-0x0000000000000000-mapping.dmp
-
memory/3172-134-0x0000000000000000-mapping.dmp
-
memory/3576-137-0x0000000000000000-mapping.dmp
-
memory/4292-142-0x0000000000000000-mapping.dmp
-
memory/4612-150-0x0000000000000000-mapping.dmp
-
memory/4712-153-0x0000000000000000-mapping.dmp