Analysis
-
max time kernel
77s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
31/10/2022, 08:11
Behavioral task
behavioral1
Sample
369831da3b841fe8ee692e72e61b78641f5d84a048b6402995d5efe0614e1c32.pdf
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
369831da3b841fe8ee692e72e61b78641f5d84a048b6402995d5efe0614e1c32.pdf
Resource
win10v2004-20220901-en
General
-
Target
369831da3b841fe8ee692e72e61b78641f5d84a048b6402995d5efe0614e1c32.pdf
-
Size
226KB
-
MD5
57fcbfd80719f7a66d52dc90c312d48e
-
SHA1
de5ea1d2eda2fef451e805a30d2e69dd61d3b116
-
SHA256
369831da3b841fe8ee692e72e61b78641f5d84a048b6402995d5efe0614e1c32
-
SHA512
b99991f1b4fe23cae3448ffa903aba61afb272a5e5ecf175098fb8478d42856d5f5e205754a1f21f5257ed533240184982a51f9487da2b8b85279e117a68071d
-
SSDEEP
6144:lc5Prfc1RuVEhT4jnh5Qom+/nLNf+YddwD6QHbL:y5Y1YWT4jnhm+1+KdY6QHX
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4752 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4752 wrote to memory of 4144 4752 AcroRd32.exe 86 PID 4752 wrote to memory of 4144 4752 AcroRd32.exe 86 PID 4752 wrote to memory of 4144 4752 AcroRd32.exe 86 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 5064 4144 RdrCEF.exe 88 PID 4144 wrote to memory of 924 4144 RdrCEF.exe 89 PID 4144 wrote to memory of 924 4144 RdrCEF.exe 89 PID 4144 wrote to memory of 924 4144 RdrCEF.exe 89 PID 4144 wrote to memory of 924 4144 RdrCEF.exe 89 PID 4144 wrote to memory of 924 4144 RdrCEF.exe 89 PID 4144 wrote to memory of 924 4144 RdrCEF.exe 89 PID 4144 wrote to memory of 924 4144 RdrCEF.exe 89 PID 4144 wrote to memory of 924 4144 RdrCEF.exe 89 PID 4144 wrote to memory of 924 4144 RdrCEF.exe 89 PID 4144 wrote to memory of 924 4144 RdrCEF.exe 89 PID 4144 wrote to memory of 924 4144 RdrCEF.exe 89 PID 4144 wrote to memory of 924 4144 RdrCEF.exe 89 PID 4144 wrote to memory of 924 4144 RdrCEF.exe 89 PID 4144 wrote to memory of 924 4144 RdrCEF.exe 89 PID 4144 wrote to memory of 924 4144 RdrCEF.exe 89 PID 4144 wrote to memory of 924 4144 RdrCEF.exe 89 PID 4144 wrote to memory of 924 4144 RdrCEF.exe 89 PID 4144 wrote to memory of 924 4144 RdrCEF.exe 89 PID 4144 wrote to memory of 924 4144 RdrCEF.exe 89 PID 4144 wrote to memory of 924 4144 RdrCEF.exe 89
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\369831da3b841fe8ee692e72e61b78641f5d84a048b6402995d5efe0614e1c32.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5DE07256941B47995F5DA89E7EA14714 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:5064
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C505BFC5B93B8A831BE7DFE985E6774B --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C505BFC5B93B8A831BE7DFE985E6774B --renderer-client-id=2 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job /prefetch:13⤵PID:924
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B690D89402959CC1FD9EAA36121A7E7C --mojo-platform-channel-handle=2188 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3948
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=6F2E231BBCFF4FB2201F727A1F12811D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=6F2E231BBCFF4FB2201F727A1F12811D --renderer-client-id=5 --mojo-platform-channel-handle=1876 --allow-no-sandbox-job /prefetch:13⤵PID:2992
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=61C93C037CA4A5523E59B7722CBB7B24 --mojo-platform-channel-handle=2548 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3108
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8A4AA5DFAC820D3AA537C9D82523E19E --mojo-platform-channel-handle=2332 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3420
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2820