Analysis
-
max time kernel
76s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2023, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
covid-19_anweisungen_quarantaene.pdf
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
covid-19_anweisungen_quarantaene.pdf
Resource
win10v2004-20221111-en
5 signatures
150 seconds
General
-
Target
covid-19_anweisungen_quarantaene.pdf
-
Size
15B
-
MD5
1441a7909c087dbbe7ce59881b9df8b9
-
SHA1
c1d44ff03aff1372856c281854f454e2e1d15b7c
-
SHA256
b28c94b2195c8ed259f0b415aaee3f39b0b2920a4537611499fa044956917a21
-
SHA512
1dccad3fad058a29ccef8e003fa71bbabf587431ac5a55fb36268bf7958c5f3cb31116ac9e855ec61bb9b72ecbd484f704bee032707fb0ead24ad2bee97b9a39
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2212 AcroRd32.exe 2212 AcroRd32.exe 2212 AcroRd32.exe 2212 AcroRd32.exe 2212 AcroRd32.exe 2212 AcroRd32.exe 2212 AcroRd32.exe 2212 AcroRd32.exe 2212 AcroRd32.exe 2212 AcroRd32.exe 2212 AcroRd32.exe 2212 AcroRd32.exe 2212 AcroRd32.exe 2212 AcroRd32.exe 2212 AcroRd32.exe 2212 AcroRd32.exe 2212 AcroRd32.exe 2212 AcroRd32.exe 2212 AcroRd32.exe 2212 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 AcroRd32.exe 2212 AcroRd32.exe 2212 AcroRd32.exe 2212 AcroRd32.exe 2212 AcroRd32.exe 2212 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2972 2212 AcroRd32.exe 85 PID 2212 wrote to memory of 2972 2212 AcroRd32.exe 85 PID 2212 wrote to memory of 2972 2212 AcroRd32.exe 85 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4016 2972 RdrCEF.exe 88 PID 2972 wrote to memory of 4032 2972 RdrCEF.exe 89 PID 2972 wrote to memory of 4032 2972 RdrCEF.exe 89 PID 2972 wrote to memory of 4032 2972 RdrCEF.exe 89 PID 2972 wrote to memory of 4032 2972 RdrCEF.exe 89 PID 2972 wrote to memory of 4032 2972 RdrCEF.exe 89 PID 2972 wrote to memory of 4032 2972 RdrCEF.exe 89 PID 2972 wrote to memory of 4032 2972 RdrCEF.exe 89 PID 2972 wrote to memory of 4032 2972 RdrCEF.exe 89 PID 2972 wrote to memory of 4032 2972 RdrCEF.exe 89 PID 2972 wrote to memory of 4032 2972 RdrCEF.exe 89 PID 2972 wrote to memory of 4032 2972 RdrCEF.exe 89 PID 2972 wrote to memory of 4032 2972 RdrCEF.exe 89 PID 2972 wrote to memory of 4032 2972 RdrCEF.exe 89 PID 2972 wrote to memory of 4032 2972 RdrCEF.exe 89 PID 2972 wrote to memory of 4032 2972 RdrCEF.exe 89 PID 2972 wrote to memory of 4032 2972 RdrCEF.exe 89 PID 2972 wrote to memory of 4032 2972 RdrCEF.exe 89 PID 2972 wrote to memory of 4032 2972 RdrCEF.exe 89 PID 2972 wrote to memory of 4032 2972 RdrCEF.exe 89 PID 2972 wrote to memory of 4032 2972 RdrCEF.exe 89
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\covid-19_anweisungen_quarantaene.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9800BF4991D3EEC3C7DA9FDD7C47BB0A --mojo-platform-channel-handle=1728 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4016
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=22B9D9C29893CB008ACD1B421CC0A9F9 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=22B9D9C29893CB008ACD1B421CC0A9F9 --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:13⤵PID:4032
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1C8C0BB39C0BE8F90C6F669FE7F40B80 --mojo-platform-channel-handle=2296 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1796
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BA9236FD99EBFA48C0F53D34412313E6 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:380
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=830D5D0CFD7216A790C7973880FAE439 --mojo-platform-channel-handle=2008 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:760
-
-