Analysis
-
max time kernel
180s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:42
Static task
static1
Behavioral task
behavioral1
Sample
RFQ23658.pdf
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
RFQ23658.pdf
Resource
win10v2004-20221111-en
General
-
Target
RFQ23658.pdf
-
Size
1.4MB
-
MD5
b872787b7062d1248f2cdfb3a71c4b6d
-
SHA1
77c9ba7cc623b6f4ec7c87bda0b144107df0730f
-
SHA256
8e889861e473920bf21243ca42050340d823bbe0f1d3f89c7ea78bd0dcfa1733
-
SHA512
c67fe08b6b46c426b1b6a73b4f45560c5efecbdb9cfb53c5385f1849abffb7c62b31eb88fdac61c2ecae1a14cb26f1a43a93a390ee677921a9e515b1517d56cf
-
SSDEEP
24576:9Pl8PlfPlRPlSPlvPlgPllPlGPlnPlcPldPlpIp9gZLHBFM13HoHqg/Nbri70jsP:9qlnwBizERObgp9i7EaJ/o7qVhheBBH
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEAcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings AcroRd32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1988 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 1684 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
AcroRd32.exeEXCEL.EXEpid process 1684 AcroRd32.exe 1684 AcroRd32.exe 1684 AcroRd32.exe 1684 AcroRd32.exe 1684 AcroRd32.exe 1684 AcroRd32.exe 1988 EXCEL.EXE 1988 EXCEL.EXE 1988 EXCEL.EXE 1988 EXCEL.EXE 1988 EXCEL.EXE 1988 EXCEL.EXE 1988 EXCEL.EXE 1988 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 1684 wrote to memory of 4664 1684 AcroRd32.exe RdrCEF.exe PID 1684 wrote to memory of 4664 1684 AcroRd32.exe RdrCEF.exe PID 1684 wrote to memory of 4664 1684 AcroRd32.exe RdrCEF.exe PID 1684 wrote to memory of 1988 1684 AcroRd32.exe EXCEL.EXE PID 1684 wrote to memory of 1988 1684 AcroRd32.exe EXCEL.EXE PID 1684 wrote to memory of 1988 1684 AcroRd32.exe EXCEL.EXE PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 4256 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 3420 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 3420 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 3420 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 3420 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 3420 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 3420 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 3420 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 3420 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 3420 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 3420 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 3420 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 3420 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 3420 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 3420 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 3420 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 3420 4664 RdrCEF.exe RdrCEF.exe PID 4664 wrote to memory of 3420 4664 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\RFQ23658.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FF834F8CAC9F2900A3F2531EB6146E51 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4256
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=21FB831AED8CF5D491819B482677573C --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=21FB831AED8CF5D491819B482677573C --renderer-client-id=2 --mojo-platform-channel-handle=1772 --allow-no-sandbox-job /prefetch:13⤵PID:3420
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=723BEF2CEC74C3B3CD04E29E61E9B214 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=723BEF2CEC74C3B3CD04E29E61E9B214 --renderer-client-id=4 --mojo-platform-channel-handle=2176 --allow-no-sandbox-job /prefetch:13⤵PID:604
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=742D23F1C8006719240DDD433A560592 --mojo-platform-channel-handle=2576 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3928
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2AB7B40BD1A4D18B1173A0B2F2C602F7 --mojo-platform-channel-handle=1980 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4496
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E3FFC75D52710A9C945FD6DDD4F02505 --mojo-platform-channel-handle=2772 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3664
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\A9R1x6l1cv_m4wggl_1as.tmp\has been verified. However PDF, IMG, docx, .xls"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1988
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3504
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\A9R1x6l1cv_m4wggl_1as.tmp\has been verified. However PDF, IMG, docx, .xls
Filesize1.0MB
MD5b18fd4de724718b8d1fa887d94731da4
SHA197377a93c7fe211badd89a8a3f6ac46e85ae1926
SHA25686fdff90584064c135a98f05986da5a03bd67abe414f1d8f5fbdbf4249430019
SHA512ec54ded9bb21cb3b653ae3835960306d4b809dd353a365c21ed932845b20b7b30f80fb1c6e039fbfa06cd828d6fb5a8e28be73293b940bada5d2a378d21622cf