Resubmissions
11/01/2023, 16:11
230111-tmzkgsdd99 1Analysis
-
max time kernel
61s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2023, 16:11
Static task
static1
Behavioral task
behavioral1
Sample
FLE_AC1200_NA05490Z_PM_01_P1946710_12-11-2022_180505.pdf
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
FLE_AC1200_NA05490Z_PM_01_P1946710_12-11-2022_180505.pdf
Resource
win10v2004-20221111-en
General
-
Target
FLE_AC1200_NA05490Z_PM_01_P1946710_12-11-2022_180505.pdf
-
Size
59KB
-
MD5
0b4c1b7a6a20baedb6584d33b77d2f4a
-
SHA1
c8e4187f0159dee4528a37403beb3ccc45cf5790
-
SHA256
0b37e065cf854142d6a8ea400a30384d898539d8f65077b3cc66b5963e034589
-
SHA512
b4997b52a63d30a5c3c038b850ead39fda8324229fdd4aaa61afa8f4e6e942c507f8d84de3d1da0b92ffd92e7e0209b37c8d99774bfc3395f4babea41de28eb4
-
SSDEEP
1536:ZZ16YgHpy7jMbIsCKD34BW/PcrR9VEKa8TC:ZZ1TuUFQIBW/PcNLDa8W
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1508 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe 1508 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1508 wrote to memory of 4308 1508 AcroRd32.exe 84 PID 1508 wrote to memory of 4308 1508 AcroRd32.exe 84 PID 1508 wrote to memory of 4308 1508 AcroRd32.exe 84 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 2276 4308 RdrCEF.exe 87 PID 4308 wrote to memory of 3664 4308 RdrCEF.exe 88 PID 4308 wrote to memory of 3664 4308 RdrCEF.exe 88 PID 4308 wrote to memory of 3664 4308 RdrCEF.exe 88 PID 4308 wrote to memory of 3664 4308 RdrCEF.exe 88 PID 4308 wrote to memory of 3664 4308 RdrCEF.exe 88 PID 4308 wrote to memory of 3664 4308 RdrCEF.exe 88 PID 4308 wrote to memory of 3664 4308 RdrCEF.exe 88 PID 4308 wrote to memory of 3664 4308 RdrCEF.exe 88 PID 4308 wrote to memory of 3664 4308 RdrCEF.exe 88 PID 4308 wrote to memory of 3664 4308 RdrCEF.exe 88 PID 4308 wrote to memory of 3664 4308 RdrCEF.exe 88 PID 4308 wrote to memory of 3664 4308 RdrCEF.exe 88 PID 4308 wrote to memory of 3664 4308 RdrCEF.exe 88 PID 4308 wrote to memory of 3664 4308 RdrCEF.exe 88 PID 4308 wrote to memory of 3664 4308 RdrCEF.exe 88 PID 4308 wrote to memory of 3664 4308 RdrCEF.exe 88 PID 4308 wrote to memory of 3664 4308 RdrCEF.exe 88 PID 4308 wrote to memory of 3664 4308 RdrCEF.exe 88 PID 4308 wrote to memory of 3664 4308 RdrCEF.exe 88 PID 4308 wrote to memory of 3664 4308 RdrCEF.exe 88
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\FLE_AC1200_NA05490Z_PM_01_P1946710_12-11-2022_180505.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5F8B11B68C8843E2CE234DBFFA9009A2 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2276
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=211331FA0C8B5F31D367F9B62AA8248B --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=211331FA0C8B5F31D367F9B62AA8248B --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:13⤵PID:3664
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B2F05121B743DC6F536327E42A55C9A0 --mojo-platform-channel-handle=2172 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4168
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=FBD6B85E1DBBAED9372279142AEE1BCB --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=FBD6B85E1DBBAED9372279142AEE1BCB --renderer-client-id=5 --mojo-platform-channel-handle=1952 --allow-no-sandbox-job /prefetch:13⤵PID:4220
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FA6580C6C3396329944540EFFB0C6249 --mojo-platform-channel-handle=2560 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3688
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5FE25FB0CFD5C134381D29E4FD0DAEC2 --mojo-platform-channel-handle=2672 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4960
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4792