Analysis
-
max time kernel
212s -
max time network
226s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:34
Static task
static1
Behavioral task
behavioral1
Sample
39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe
Resource
win10v2004-20220812-en
General
-
Target
39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe
-
Size
519KB
-
MD5
b1415073293fa408b8c1a31bdc34fcc4
-
SHA1
37642c6145a1f451c88b710b8573bca7afa7ba81
-
SHA256
39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b
-
SHA512
b48214ddc7006268a2c2f273602b70e45aca4e909025e44b41b890455e527f94bbf36796fac7e0b1af656cefdfab5d79dff85d31b14f310990bba0c72fddb25b
-
SSDEEP
12288:RnCOMDRxONM9eVXeHwv70Kd5hLVxKHx6KoUur6iQafK:RnCjDFHVKd5bKofhc
Malware Config
Extracted
xtremerat
alertsdanish.bounceme.net
čalertsdanish.bounceme.net
Signatures
-
Detect XtremeRAT payload 11 IoCs
Processes:
resource yara_rule behavioral2/memory/3456-134-0x0000000000000000-mapping.dmp family_xtremerat behavioral2/memory/3456-135-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral2/memory/3456-136-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral2/memory/3456-137-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral2/memory/4776-138-0x0000000000000000-mapping.dmp family_xtremerat behavioral2/memory/4764-139-0x0000000000000000-mapping.dmp family_xtremerat behavioral2/memory/3456-140-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral2/memory/4776-141-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral2/memory/4764-142-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral2/memory/3456-144-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat behavioral2/memory/4764-164-0x0000000010000000-0x0000000010097000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{TWDB4HK2-65MQ-224E-01L2-YY6624NJV2XC} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{TWDB4HK2-65MQ-224E-01L2-YY6624NJV2XC}\StubPath = "C:\\Windows\\InstallDir\\svchost.exe restart" explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXEdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\svchost.exe" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\svchost.exe" explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exedescription pid process target process PID 2152 set thread context of 3456 2152 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE -
Drops file in Windows directory 5 IoCs
Processes:
explorer.exe39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXEdescription ioc process File opened for modification C:\Windows\InstallDir\svchost.exe explorer.exe File created C:\Windows\InstallDir\svchost.exe explorer.exe File opened for modification C:\Windows\InstallDir\ explorer.exe File created C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE File created C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4528 4776 WerFault.exe svchost.exe 4100 4776 WerFault.exe svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
AcroRd32.exepid process 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exeexplorer.exeAcroRd32.exepid process 2152 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 4764 explorer.exe 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXEAcroRd32.exeRdrCEF.exedescription pid process target process PID 2152 wrote to memory of 3456 2152 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 2152 wrote to memory of 3456 2152 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 2152 wrote to memory of 3456 2152 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 2152 wrote to memory of 3456 2152 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 2152 wrote to memory of 3456 2152 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 2152 wrote to memory of 3456 2152 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 2152 wrote to memory of 3456 2152 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 2152 wrote to memory of 3456 2152 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 2152 wrote to memory of 3456 2152 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 2152 wrote to memory of 3456 2152 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 2152 wrote to memory of 3456 2152 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 2152 wrote to memory of 3456 2152 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 2152 wrote to memory of 3456 2152 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE PID 3456 wrote to memory of 4776 3456 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE svchost.exe PID 3456 wrote to memory of 4776 3456 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE svchost.exe PID 3456 wrote to memory of 4776 3456 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE svchost.exe PID 3456 wrote to memory of 4776 3456 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE svchost.exe PID 3456 wrote to memory of 4764 3456 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE explorer.exe PID 3456 wrote to memory of 4764 3456 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE explorer.exe PID 3456 wrote to memory of 4764 3456 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE explorer.exe PID 3456 wrote to memory of 4764 3456 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE explorer.exe PID 3456 wrote to memory of 1444 3456 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE AcroRd32.exe PID 3456 wrote to memory of 1444 3456 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE AcroRd32.exe PID 3456 wrote to memory of 1444 3456 39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE AcroRd32.exe PID 1444 wrote to memory of 3764 1444 AcroRd32.exe RdrCEF.exe PID 1444 wrote to memory of 3764 1444 AcroRd32.exe RdrCEF.exe PID 1444 wrote to memory of 3764 1444 AcroRd32.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe PID 3764 wrote to memory of 3504 3764 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe"C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE"C:\Users\Admin\AppData\Local\Temp\39ecc03892d92ca63c0393580cee198b7cdd3b6ce2be337aed947802c882753b.EXE"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:4776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 4844⤵
- Program crash
PID:4528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 4924⤵
- Program crash
PID:4100 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4764 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Windows\210Moto-Azabu Hills Apt 2204 Rosbacher.pdf"3⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140434⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4A59B6C8EAB0CE596DC962186A8C63F1 --mojo-platform-channel-handle=1728 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:3504
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=0F56991FB7A7EFDB7B8651EC2765FC7D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=0F56991FB7A7EFDB7B8651EC2765FC7D --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:15⤵PID:3116
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FAF3BDA5156F1A1AB9A7F806DD40A4F6 --mojo-platform-channel-handle=2304 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:2964
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C80DB1D5269A71546A8B64A10F1B2C05 --mojo-platform-channel-handle=1972 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:768
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7A8056A6748C58BEA6A050D5E5E9B741 --mojo-platform-channel-handle=2324 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵PID:536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4776 -ip 47761⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4776 -ip 47761⤵PID:1972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:800
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD523bbd7c3a81207672ed44de64c7a3289
SHA1a190365064ad07ca95fcbe03c175b1ad575e1aa2
SHA256d23e94dfa47e49e83e3fbd60817e2cd20701ec1d06a4310845edfdb5f784b34d
SHA5124e1c7c423c6385376ab1bad1f660a8bb9bb9af0d94befcf65ceee7057dcc4991beb5abc4e4a5339c7c3b65a4ff60627b0381cc75cb1f1e9ae4c85ab93df397e4