Analysis
-
max time kernel
92s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2022 11:07
Behavioral task
behavioral1
Sample
881ca61188641bbdf1650046f7415d201fb301eec235654b110aff26c47a9d94.pdf
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
881ca61188641bbdf1650046f7415d201fb301eec235654b110aff26c47a9d94.pdf
Resource
win10v2004-20220812-en
General
-
Target
881ca61188641bbdf1650046f7415d201fb301eec235654b110aff26c47a9d94.pdf
-
Size
472KB
-
MD5
331f94a4c85203b5d3d36bd4fa169720
-
SHA1
71957273d8cda989fa0cfe59bc60a8d7bb24187c
-
SHA256
881ca61188641bbdf1650046f7415d201fb301eec235654b110aff26c47a9d94
-
SHA512
fb99816ab5e71b323ca4ffe1908c21fbe1e319368da66047525a3e520de9349cefbc9a51adf41f6a138b1dc0b702277a11d66be9c280f42936469c17643622a7
-
SSDEEP
12288:3H9G6jNi6lN5j0llLA7+YVtK7SaV89O6qAWWO+owfWm:Xm6lN5glhAKYV8mauQWf5fF
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4088 AcroRd32.exe 4088 AcroRd32.exe 4088 AcroRd32.exe 4088 AcroRd32.exe 4088 AcroRd32.exe 4088 AcroRd32.exe 4088 AcroRd32.exe 4088 AcroRd32.exe 4088 AcroRd32.exe 4088 AcroRd32.exe 4088 AcroRd32.exe 4088 AcroRd32.exe 4088 AcroRd32.exe 4088 AcroRd32.exe 4088 AcroRd32.exe 4088 AcroRd32.exe 4088 AcroRd32.exe 4088 AcroRd32.exe 4088 AcroRd32.exe 4088 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4088 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4088 AcroRd32.exe 4088 AcroRd32.exe 4088 AcroRd32.exe 4088 AcroRd32.exe 4088 AcroRd32.exe 4088 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4088 wrote to memory of 3472 4088 AcroRd32.exe 84 PID 4088 wrote to memory of 3472 4088 AcroRd32.exe 84 PID 4088 wrote to memory of 3472 4088 AcroRd32.exe 84 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 964 3472 RdrCEF.exe 87 PID 3472 wrote to memory of 700 3472 RdrCEF.exe 88 PID 3472 wrote to memory of 700 3472 RdrCEF.exe 88 PID 3472 wrote to memory of 700 3472 RdrCEF.exe 88 PID 3472 wrote to memory of 700 3472 RdrCEF.exe 88 PID 3472 wrote to memory of 700 3472 RdrCEF.exe 88 PID 3472 wrote to memory of 700 3472 RdrCEF.exe 88 PID 3472 wrote to memory of 700 3472 RdrCEF.exe 88 PID 3472 wrote to memory of 700 3472 RdrCEF.exe 88 PID 3472 wrote to memory of 700 3472 RdrCEF.exe 88 PID 3472 wrote to memory of 700 3472 RdrCEF.exe 88 PID 3472 wrote to memory of 700 3472 RdrCEF.exe 88 PID 3472 wrote to memory of 700 3472 RdrCEF.exe 88 PID 3472 wrote to memory of 700 3472 RdrCEF.exe 88 PID 3472 wrote to memory of 700 3472 RdrCEF.exe 88 PID 3472 wrote to memory of 700 3472 RdrCEF.exe 88 PID 3472 wrote to memory of 700 3472 RdrCEF.exe 88 PID 3472 wrote to memory of 700 3472 RdrCEF.exe 88 PID 3472 wrote to memory of 700 3472 RdrCEF.exe 88 PID 3472 wrote to memory of 700 3472 RdrCEF.exe 88 PID 3472 wrote to memory of 700 3472 RdrCEF.exe 88
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\881ca61188641bbdf1650046f7415d201fb301eec235654b110aff26c47a9d94.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6BB2965F1C1DA803299DE2BC717F0D7A --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:964
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=87A3243DDFEA18A1D5147DDC8D8418D4 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=87A3243DDFEA18A1D5147DDC8D8418D4 --renderer-client-id=2 --mojo-platform-channel-handle=1736 --allow-no-sandbox-job /prefetch:13⤵PID:700
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2B86D9EDA3D06D8044BC446B098C8366 --mojo-platform-channel-handle=2296 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2592
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=A6F898305E8C6FF927ED6D38EC92D8AF --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=A6F898305E8C6FF927ED6D38EC92D8AF --renderer-client-id=5 --mojo-platform-channel-handle=1848 --allow-no-sandbox-job /prefetch:13⤵PID:1444
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BFE3D5570775A3A55526E5CAA60D0249 --mojo-platform-channel-handle=2552 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4792
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=198B0A012A1D501CE325DAEA61CDAA3B --mojo-platform-channel-handle=2660 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1588
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4656