Analysis

  • max time kernel
    171s
  • max time network
    211s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 19:32

General

  • Target

    盘管计算书/18650风量/注液间机组参数.pdf

  • Size

    88KB

  • MD5

    ccaf8b6b9472df2e5c00cd9efaa9dba7

  • SHA1

    d2552166a5dd397f3aab94b5daa5bb2ccd6ebf03

  • SHA256

    fdd2c59fba9f973cf47fc9ec3d3b0405b0bacda3428d77baa6e59e4b5ea955b4

  • SHA512

    ce15bcf301ee5152501caf2c87926021552272588160d3812a2449d1c10482959c9d97e77daac6b3ed88e0d6301745dc2e2f9902cfb4b1a3a11f402cd166cafa

  • SSDEEP

    1536:SziNLBnZfbLgb5zuEcEjthv6+EFsOJCkvGZUix:CcLBnZ3gb5zuEcEjvPEPwkQU8

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\盘管计算书\18650风量\注液间机组参数.pdf"
    1⤵
    • Checks processor information in registry
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
      2⤵
        PID:2388
      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
        2⤵
          PID:3976

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2388-132-0x0000000000000000-mapping.dmp
      • memory/3976-133-0x0000000000000000-mapping.dmp