Analysis
-
max time kernel
112s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 12:54
Static task
static1
Behavioral task
behavioral1
Sample
0d8ffe1068ffd3523f0a73c0480d4435f8a1033759131c4e4dc161070fc02848.pdf
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0d8ffe1068ffd3523f0a73c0480d4435f8a1033759131c4e4dc161070fc02848.pdf
Resource
win10v2004-20220812-en
General
-
Target
0d8ffe1068ffd3523f0a73c0480d4435f8a1033759131c4e4dc161070fc02848.pdf
-
Size
23KB
-
MD5
b8ead97f4569a70d42f9b42cfda34518
-
SHA1
d54491267134a2e77205310b31ef18c819a7fdf9
-
SHA256
0d8ffe1068ffd3523f0a73c0480d4435f8a1033759131c4e4dc161070fc02848
-
SHA512
fd2f14522633c13a4b79373da11479a1b4c82175ad6346bb4ff8e32a8a5a3592dddfdad8d1b444bdc8fa53dde8f7ea3937dbc285688a94885992cd6f866028b4
-
SSDEEP
384:vNhR005F1+fvBNlgRKI5YkomGnu93hF1FCVtBEb5xjJb1GKgnb3kxJ4:vRP18pNlgF5dVGu9nCVtB0jVsKF74
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
WaaSMedicAgent.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\DoSvc\ImagePath = "C:\\Windows\\System32\\svchost.exe -k NetworkService -p" WaaSMedicAgent.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies data under HKEY_USERS 41 IoCs
Processes:
WaaSMedicAgent.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
AcroRd32.exepid process 4864 AcroRd32.exe 4864 AcroRd32.exe 4864 AcroRd32.exe 4864 AcroRd32.exe 4864 AcroRd32.exe 4864 AcroRd32.exe 4864 AcroRd32.exe 4864 AcroRd32.exe 4864 AcroRd32.exe 4864 AcroRd32.exe 4864 AcroRd32.exe 4864 AcroRd32.exe 4864 AcroRd32.exe 4864 AcroRd32.exe 4864 AcroRd32.exe 4864 AcroRd32.exe 4864 AcroRd32.exe 4864 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 4864 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AcroRd32.exepid process 4864 AcroRd32.exe 4864 AcroRd32.exe 4864 AcroRd32.exe 4864 AcroRd32.exe 4864 AcroRd32.exe 4864 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 4864 wrote to memory of 5056 4864 AcroRd32.exe RdrCEF.exe PID 4864 wrote to memory of 5056 4864 AcroRd32.exe RdrCEF.exe PID 4864 wrote to memory of 5056 4864 AcroRd32.exe RdrCEF.exe PID 4864 wrote to memory of 1356 4864 AcroRd32.exe RdrCEF.exe PID 4864 wrote to memory of 1356 4864 AcroRd32.exe RdrCEF.exe PID 4864 wrote to memory of 1356 4864 AcroRd32.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 3580 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 4248 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 4248 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 4248 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 4248 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 4248 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 4248 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 4248 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 4248 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 4248 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 4248 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 4248 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 4248 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 4248 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 4248 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 4248 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 4248 5056 RdrCEF.exe RdrCEF.exe PID 5056 wrote to memory of 4248 5056 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0d8ffe1068ffd3523f0a73c0480d4435f8a1033759131c4e4dc161070fc02848.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A612C91EFEA15D8F6084D54D10FE4ADD --mojo-platform-channel-handle=1724 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=E3AA44E8BB5C273453194EA948CF355F --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=E3AA44E8BB5C273453194EA948CF355F --renderer-client-id=2 --mojo-platform-channel-handle=1832 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=5A3AEAAAC9261DD214FC861F80E6B90B --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=5A3AEAAAC9261DD214FC861F80E6B90B --renderer-client-id=4 --mojo-platform-channel-handle=2140 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=54800A7F6E4EF1C692160E45B8D2CF73 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2D5E86EA3060D43D53F7183485EB3837 --mojo-platform-channel-handle=2548 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=EA0684846CE5788D7E058A7670DB9B64 --mojo-platform-channel-handle=2548 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe a890319f2c9018e224e25e9043ca780c IfKgt23Tp0SSXeijV8Dc4w.0.1.0.0.01⤵
- Sets service image path in registry
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1356-133-0x0000000000000000-mapping.dmp
-
memory/1576-151-0x0000000000000000-mapping.dmp
-
memory/2368-154-0x0000000000000000-mapping.dmp
-
memory/3580-135-0x0000000000000000-mapping.dmp
-
memory/4248-138-0x0000000000000000-mapping.dmp
-
memory/4652-148-0x0000000000000000-mapping.dmp
-
memory/4668-143-0x0000000000000000-mapping.dmp
-
memory/5056-132-0x0000000000000000-mapping.dmp