Analysis
-
max time kernel
84s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-10-2022 10:59
Static task
static1
Behavioral task
behavioral1
Sample
c9eae34045dc73e579fda82dd68cdc8fe1835d993d5ff103388d198b9a896d64.pdf
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c9eae34045dc73e579fda82dd68cdc8fe1835d993d5ff103388d198b9a896d64.pdf
Resource
win10v2004-20220812-en
General
-
Target
c9eae34045dc73e579fda82dd68cdc8fe1835d993d5ff103388d198b9a896d64.pdf
-
Size
24.9MB
-
MD5
44714f3f451f8e3fbb753f9585113e1b
-
SHA1
eef37b378033e2b2160150833d6a44c8f2c66c97
-
SHA256
c9eae34045dc73e579fda82dd68cdc8fe1835d993d5ff103388d198b9a896d64
-
SHA512
c6d33b0df2bcff72f5f4cd1f5c3eff9b1d4e35c26b5d12d47bb8ab23bdfa99b991eed5e792c648d1604e3674f6f0d19faa5e35267e9c601ba2cbaf74b4cc3748
-
SSDEEP
393216:Y1BFPRnL/AgrD7cLBZmyTnoyFNVA3GGVIQnuzaUyj+xN2YIz4Diage/Nsh0zH7Eg:2jRnL/AgrD7cLBZmyTnoaGMAlQetLL5M
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe 2528 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2528 wrote to memory of 4200 2528 AcroRd32.exe 83 PID 2528 wrote to memory of 4200 2528 AcroRd32.exe 83 PID 2528 wrote to memory of 4200 2528 AcroRd32.exe 83 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 3924 4200 RdrCEF.exe 87 PID 4200 wrote to memory of 1812 4200 RdrCEF.exe 88 PID 4200 wrote to memory of 1812 4200 RdrCEF.exe 88 PID 4200 wrote to memory of 1812 4200 RdrCEF.exe 88 PID 4200 wrote to memory of 1812 4200 RdrCEF.exe 88 PID 4200 wrote to memory of 1812 4200 RdrCEF.exe 88 PID 4200 wrote to memory of 1812 4200 RdrCEF.exe 88 PID 4200 wrote to memory of 1812 4200 RdrCEF.exe 88 PID 4200 wrote to memory of 1812 4200 RdrCEF.exe 88 PID 4200 wrote to memory of 1812 4200 RdrCEF.exe 88 PID 4200 wrote to memory of 1812 4200 RdrCEF.exe 88 PID 4200 wrote to memory of 1812 4200 RdrCEF.exe 88 PID 4200 wrote to memory of 1812 4200 RdrCEF.exe 88 PID 4200 wrote to memory of 1812 4200 RdrCEF.exe 88 PID 4200 wrote to memory of 1812 4200 RdrCEF.exe 88 PID 4200 wrote to memory of 1812 4200 RdrCEF.exe 88 PID 4200 wrote to memory of 1812 4200 RdrCEF.exe 88 PID 4200 wrote to memory of 1812 4200 RdrCEF.exe 88 PID 4200 wrote to memory of 1812 4200 RdrCEF.exe 88 PID 4200 wrote to memory of 1812 4200 RdrCEF.exe 88 PID 4200 wrote to memory of 1812 4200 RdrCEF.exe 88
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\c9eae34045dc73e579fda82dd68cdc8fe1835d993d5ff103388d198b9a896d64.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A2FABA4B3BD94D4F8A6E0C39E82A1CEE --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3924
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=98C031A2DE93B9442E161F38AA593C70 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=98C031A2DE93B9442E161F38AA593C70 --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:13⤵PID:1812
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C1D6BD1EAD2CBB3E5761A8DEE8CCBEA3 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C1D6BD1EAD2CBB3E5761A8DEE8CCBEA3 --renderer-client-id=4 --mojo-platform-channel-handle=2164 --allow-no-sandbox-job /prefetch:13⤵PID:2496
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E2707A4FA1A56F2264216DEC4279221A --mojo-platform-channel-handle=1852 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4880
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4EC4996E2DFBE84C9B8B889A1746A314 --mojo-platform-channel-handle=2556 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1572
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=72DDCF6E7DF5952CF4546BD3A65D16DA --mojo-platform-channel-handle=1936 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3820
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4524