Overview
overview
8Static
static
4ClickShare...er.msi
windows7-x64
8ClickShare...er.msi
windows10-2004-x64
8Quick start guide.pdf
windows7-x64
1Quick start guide.pdf
windows10-2004-x64
1[KB11496] ...CM.pdf
windows7-x64
1[KB11496] ...CM.pdf
windows10-2004-x64
1[KB11526] ...ly.pdf
windows7-x64
1[KB11526] ...ly.pdf
windows10-2004-x64
1[KB12000] ...I).pdf
windows7-x64
1[KB12000] ...I).pdf
windows10-2004-x64
1[KB8544] B...ny.pdf
windows7-x64
1[KB8544] B...ny.pdf
windows10-2004-x64
5Analysis
-
max time kernel
132s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2023 08:06
Behavioral task
behavioral1
Sample
ClickShare_Installer.msi
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ClickShare_Installer.msi
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Quick start guide.pdf
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Quick start guide.pdf
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
[KB11496] Deploying the ClickShare App with Microsoft SCCM.pdf
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
[KB11496] Deploying the ClickShare App with Microsoft SCCM.pdf
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
[KB11526] How to uninstall ClickShare Desktop app v4.3 massively.pdf
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
[KB11526] How to uninstall ClickShare Desktop app v4.3 massively.pdf
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
[KB12000] What are the available parameters for the ClickShare Desktop App installer (MSI).pdf
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
[KB12000] What are the available parameters for the ClickShare Desktop App installer (MSI).pdf
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
[KB8544] Bulk Distribution cross your company.pdf
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
[KB8544] Bulk Distribution cross your company.pdf
Resource
win10v2004-20220812-en
General
-
Target
Quick start guide.pdf
-
Size
835KB
-
MD5
f36ade193c8abd1b7cac5ad4dfcadf6f
-
SHA1
bab7bdf44fa9c683aef98c53ffface27d8caaa70
-
SHA256
620f0875587f038844eb1d43d35d328adf405cf8e57107127a3005c90d88a9ff
-
SHA512
3f47ccb80a9d4cd72c95e2a5ab82eec4c9255c114666db034fc44009dae32779ca79b89f1b39c51ccac7c1fb94d99dfa82395e83ed2b0ddd2fb0be8239ef921b
-
SSDEEP
12288:h/dIr/xNvXgqt4TzP6Zx5Z1VdKUxeaCos55d0G0nHYoLSi0P6BnM1TTQfDXhRmLt:h/uNvXgqisHLMks556xWaAYfDXhRmLPV
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3312 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe 3312 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3312 wrote to memory of 1992 3312 AcroRd32.exe 80 PID 3312 wrote to memory of 1992 3312 AcroRd32.exe 80 PID 3312 wrote to memory of 1992 3312 AcroRd32.exe 80 PID 3312 wrote to memory of 1468 3312 AcroRd32.exe 83 PID 3312 wrote to memory of 1468 3312 AcroRd32.exe 83 PID 3312 wrote to memory of 1468 3312 AcroRd32.exe 83 PID 3312 wrote to memory of 3320 3312 AcroRd32.exe 84 PID 3312 wrote to memory of 3320 3312 AcroRd32.exe 84 PID 3312 wrote to memory of 3320 3312 AcroRd32.exe 84 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4124 3320 RdrCEF.exe 85 PID 3320 wrote to memory of 4932 3320 RdrCEF.exe 86 PID 3320 wrote to memory of 4932 3320 RdrCEF.exe 86 PID 3320 wrote to memory of 4932 3320 RdrCEF.exe 86 PID 3320 wrote to memory of 4932 3320 RdrCEF.exe 86 PID 3320 wrote to memory of 4932 3320 RdrCEF.exe 86 PID 3320 wrote to memory of 4932 3320 RdrCEF.exe 86 PID 3320 wrote to memory of 4932 3320 RdrCEF.exe 86 PID 3320 wrote to memory of 4932 3320 RdrCEF.exe 86 PID 3320 wrote to memory of 4932 3320 RdrCEF.exe 86 PID 3320 wrote to memory of 4932 3320 RdrCEF.exe 86 PID 3320 wrote to memory of 4932 3320 RdrCEF.exe 86 PID 3320 wrote to memory of 4932 3320 RdrCEF.exe 86 PID 3320 wrote to memory of 4932 3320 RdrCEF.exe 86 PID 3320 wrote to memory of 4932 3320 RdrCEF.exe 86
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Quick start guide.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:1992
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:1468
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=AC5CD2127BA0EE3F96CB360981C68EDB --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4124
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=967EDDD33929DE6F580D85230C6A81CD --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=967EDDD33929DE6F580D85230C6A81CD --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:13⤵PID:4932
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=465B623E88139927E5BF3B4A4CDB751E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=465B623E88139927E5BF3B4A4CDB751E --renderer-client-id=4 --mojo-platform-channel-handle=2176 --allow-no-sandbox-job /prefetch:13⤵PID:664
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A7FFB268C16AB580C866FAFE2B3FBDCE --mojo-platform-channel-handle=2420 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1224
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C5A6A5293ED317023D8BD5C1CD5714BC --mojo-platform-channel-handle=1956 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4100
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A474356C49A6A70FDC648464EEACA7B7 --mojo-platform-channel-handle=1976 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2368
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3588