Analysis
-
max time kernel
76s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2022, 11:08
Static task
static1
Behavioral task
behavioral1
Sample
262ab5b5e5ad51d2f72be262d7e0162a60e80a28ae2dc100116f71888cd30fdd.pdf
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
262ab5b5e5ad51d2f72be262d7e0162a60e80a28ae2dc100116f71888cd30fdd.pdf
Resource
win10v2004-20220901-en
General
-
Target
262ab5b5e5ad51d2f72be262d7e0162a60e80a28ae2dc100116f71888cd30fdd.pdf
-
Size
966KB
-
MD5
b99c50f14b01751728a1595db968074d
-
SHA1
549e4387ee7b861ad5d769897af7e46697b6fec8
-
SHA256
262ab5b5e5ad51d2f72be262d7e0162a60e80a28ae2dc100116f71888cd30fdd
-
SHA512
59d9408e5a8dfadf7e5bd9d2902b2088531ef0e9139d95357d99b3c0dfd74c6322913886e93a80298df6772100ef4502a762a1606330547c6a2ed46f26056203
-
SSDEEP
24576:ALHbQgtmVFg+2D0jpY/jm6kMjJ3ExV9gFOtV5jBoCz/8:AdtSFgD0W/CWRsVGFCHjFz/8
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3436 AcroRd32.exe 3436 AcroRd32.exe 3436 AcroRd32.exe 3436 AcroRd32.exe 3436 AcroRd32.exe 3436 AcroRd32.exe 3436 AcroRd32.exe 3436 AcroRd32.exe 3436 AcroRd32.exe 3436 AcroRd32.exe 3436 AcroRd32.exe 3436 AcroRd32.exe 3436 AcroRd32.exe 3436 AcroRd32.exe 3436 AcroRd32.exe 3436 AcroRd32.exe 3436 AcroRd32.exe 3436 AcroRd32.exe 3436 AcroRd32.exe 3436 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3436 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3436 AcroRd32.exe 3436 AcroRd32.exe 3436 AcroRd32.exe 3436 AcroRd32.exe 3436 AcroRd32.exe 3436 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3436 wrote to memory of 1496 3436 AcroRd32.exe 84 PID 3436 wrote to memory of 1496 3436 AcroRd32.exe 84 PID 3436 wrote to memory of 1496 3436 AcroRd32.exe 84 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 204 1496 RdrCEF.exe 86 PID 1496 wrote to memory of 1932 1496 RdrCEF.exe 87 PID 1496 wrote to memory of 1932 1496 RdrCEF.exe 87 PID 1496 wrote to memory of 1932 1496 RdrCEF.exe 87 PID 1496 wrote to memory of 1932 1496 RdrCEF.exe 87 PID 1496 wrote to memory of 1932 1496 RdrCEF.exe 87 PID 1496 wrote to memory of 1932 1496 RdrCEF.exe 87 PID 1496 wrote to memory of 1932 1496 RdrCEF.exe 87 PID 1496 wrote to memory of 1932 1496 RdrCEF.exe 87 PID 1496 wrote to memory of 1932 1496 RdrCEF.exe 87 PID 1496 wrote to memory of 1932 1496 RdrCEF.exe 87 PID 1496 wrote to memory of 1932 1496 RdrCEF.exe 87 PID 1496 wrote to memory of 1932 1496 RdrCEF.exe 87 PID 1496 wrote to memory of 1932 1496 RdrCEF.exe 87 PID 1496 wrote to memory of 1932 1496 RdrCEF.exe 87 PID 1496 wrote to memory of 1932 1496 RdrCEF.exe 87 PID 1496 wrote to memory of 1932 1496 RdrCEF.exe 87 PID 1496 wrote to memory of 1932 1496 RdrCEF.exe 87 PID 1496 wrote to memory of 1932 1496 RdrCEF.exe 87
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\262ab5b5e5ad51d2f72be262d7e0162a60e80a28ae2dc100116f71888cd30fdd.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=76B41CEC40A2DE84FBADDB6E3EDAA0A8 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=76B41CEC40A2DE84FBADDB6E3EDAA0A8 --renderer-client-id=2 --mojo-platform-channel-handle=1720 --allow-no-sandbox-job /prefetch:13⤵PID:204
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E5EB43427DC6EB4F12428A50C39F017E --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1932
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=723265CA8A16BD31709FF25DD29BAF23 --mojo-platform-channel-handle=2300 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:724
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=84D106066879B7F9891003A619A2D3E8 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=84D106066879B7F9891003A619A2D3E8 --renderer-client-id=5 --mojo-platform-channel-handle=1988 --allow-no-sandbox-job /prefetch:13⤵PID:2664
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=918C0122BB9B5F072D0030F361460279 --mojo-platform-channel-handle=2668 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3644
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=771496D251F9589CA6D7B48C15A5AB73 --mojo-platform-channel-handle=2568 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4556
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1988