Analysis
-
max time kernel
91s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2023, 16:00
Behavioral task
behavioral1
Sample
PDF-DOC30012023001.pdf
Resource
win7-20221111-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
PDF-DOC30012023001.pdf
Resource
win10v2004-20220812-en
6 signatures
150 seconds
General
-
Target
PDF-DOC30012023001.pdf
-
Size
52KB
-
MD5
fbf30ec7e7203263126e7d780ab2320f
-
SHA1
b13ef3ac52f6ac021d59e0b5e07b566f288df15e
-
SHA256
a4455ec35b8a73aa174524677171d20224075660888b2cfbc80190b90193463e
-
SHA512
5e41e7adf172516cf9e91e465c182c581ffd16764e2dcdec823ec2b9b0666f8e2bbe3963fa200087d862ebefc61dd38629bcfcb3fb2d9b4d44aa3e4df1737846
-
SSDEEP
1536:GGVHP3Xb9PJ9ZovublyOml1URdkihzHa2yCgq:GGt35R0ubl5mlWR3VHqq
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe 2248 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2248 wrote to memory of 1312 2248 AcroRd32.exe 79 PID 2248 wrote to memory of 1312 2248 AcroRd32.exe 79 PID 2248 wrote to memory of 1312 2248 AcroRd32.exe 79 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 1080 1312 RdrCEF.exe 82 PID 1312 wrote to memory of 2828 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2828 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2828 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2828 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2828 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2828 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2828 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2828 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2828 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2828 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2828 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2828 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2828 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2828 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2828 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2828 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2828 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2828 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2828 1312 RdrCEF.exe 83 PID 1312 wrote to memory of 2828 1312 RdrCEF.exe 83
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\PDF-DOC30012023001.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3787113645D88D49DCBD21A0506162A2 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1080
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C19633A649CB7A5B0CC714269C3C6815 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C19633A649CB7A5B0CC714269C3C6815 --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:13⤵PID:2828
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=044B53BBA99864CFB2A73CD6C42F2B67 --mojo-platform-channel-handle=2328 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4856
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=DF660B89D0A421A700B61F5D0210CDFF --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=DF660B89D0A421A700B61F5D0210CDFF --renderer-client-id=5 --mojo-platform-channel-handle=1964 --allow-no-sandbox-job /prefetch:13⤵PID:4752
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8E757DCEDB990B461C4E752C3ACDDDA4 --mojo-platform-channel-handle=2580 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4204
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=58C37738738EA6AC64926895C406DA20 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4516
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:592