Analysis
-
max time kernel
180s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 17:45
Static task
static1
Behavioral task
behavioral1
Sample
8969122ef3485d.ps1
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8969122ef3485d.ps1
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
8969122ef3485df.ps1
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
8969122ef3485df.ps1
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
PO-12-5-2022.lnk
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
PO-12-5-2022.lnk
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
document.pdf
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
document.pdf
Resource
win10v2004-20221111-en
General
-
Target
document.pdf
-
Size
10KB
-
MD5
8a7cadbe3c40344007c5334b41f0e8cf
-
SHA1
fbc916f065157cc5a13f22453c19f7dfecc3c228
-
SHA256
3902e1734b1d0187d3404dafa4616212342630cb46913242060f485e58201a75
-
SHA512
8c5e0d7a938ac13537041335d5ea185e83e025b6da138c0c3c49794825e873a52c048b08579711a888bae6e9fedc03996dbb5a2696844bb5335b8f96017dcbdb
-
SSDEEP
192:GWY3Ro9kPRzjVap5F5rBfHOHAo9u8wGW1/Pgk/pDqX1TX5DESqyuZnZgprCZ5npK:GWaHhjVsHmAocZd1/f/pO1VDULERCZ58
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
AcroRd32.exepid process 732 AcroRd32.exe 732 AcroRd32.exe 732 AcroRd32.exe 732 AcroRd32.exe 732 AcroRd32.exe 732 AcroRd32.exe 732 AcroRd32.exe 732 AcroRd32.exe 732 AcroRd32.exe 732 AcroRd32.exe 732 AcroRd32.exe 732 AcroRd32.exe 732 AcroRd32.exe 732 AcroRd32.exe 732 AcroRd32.exe 732 AcroRd32.exe 732 AcroRd32.exe 732 AcroRd32.exe 732 AcroRd32.exe 732 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 732 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
AcroRd32.exepid process 732 AcroRd32.exe 732 AcroRd32.exe 732 AcroRd32.exe 732 AcroRd32.exe 732 AcroRd32.exe 732 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeRdrCEF.exedescription pid process target process PID 732 wrote to memory of 3496 732 AcroRd32.exe RdrCEF.exe PID 732 wrote to memory of 3496 732 AcroRd32.exe RdrCEF.exe PID 732 wrote to memory of 3496 732 AcroRd32.exe RdrCEF.exe PID 732 wrote to memory of 3872 732 AcroRd32.exe RdrCEF.exe PID 732 wrote to memory of 3872 732 AcroRd32.exe RdrCEF.exe PID 732 wrote to memory of 3872 732 AcroRd32.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 4320 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 5032 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 5032 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 5032 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 5032 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 5032 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 5032 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 5032 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 5032 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 5032 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 5032 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 5032 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 5032 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 5032 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 5032 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 5032 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 5032 3496 RdrCEF.exe RdrCEF.exe PID 3496 wrote to memory of 5032 3496 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\document.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FC3B213AB20E2F8B2E7C9A16192D3C28 --mojo-platform-channel-handle=1628 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=536EB54E3E28556756A140FB06C882B3 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=536EB54E3E28556756A140FB06C882B3 --renderer-client-id=2 --mojo-platform-channel-handle=1792 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=DEA0423628F3F8E41C75E6E214AD6772 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=DEA0423628F3F8E41C75E6E214AD6772 --renderer-client-id=4 --mojo-platform-channel-handle=2156 --allow-no-sandbox-job /prefetch:13⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E416AA0876E0A6A0D204B3CDFC7702BC --mojo-platform-channel-handle=2536 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=56EAF5D4055961FC291F4D5B0F3335C8 --mojo-platform-channel-handle=2560 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A49DB3E553429F616E9A4D8EE16E27A7 --mojo-platform-channel-handle=1896 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1040-148-0x0000000000000000-mapping.dmp
-
memory/1504-154-0x0000000000000000-mapping.dmp
-
memory/3172-143-0x0000000000000000-mapping.dmp
-
memory/3232-151-0x0000000000000000-mapping.dmp
-
memory/3496-132-0x0000000000000000-mapping.dmp
-
memory/3872-133-0x0000000000000000-mapping.dmp
-
memory/4320-135-0x0000000000000000-mapping.dmp
-
memory/5032-138-0x0000000000000000-mapping.dmp