Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
08/02/2023, 17:28
Behavioral task
behavioral1
Sample
2128A82159EF5F38F558622F77EB7E76BA1F65F82309AE5B0D02B8FCB9626072.pdf
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2128A82159EF5F38F558622F77EB7E76BA1F65F82309AE5B0D02B8FCB9626072.pdf
Resource
win10v2004-20220812-en
General
-
Target
2128A82159EF5F38F558622F77EB7E76BA1F65F82309AE5B0D02B8FCB9626072.pdf
-
Size
109KB
-
MD5
3da264dfd59dad6b30c0cafbc7eff519
-
SHA1
7fcd1dbd817894328fcde0ff758d0bf510418b03
-
SHA256
2128a82159ef5f38f558622f77eb7e76ba1f65f82309ae5b0d02b8fcb9626072
-
SHA512
9e0a42ca9a538e41523b9d42b721cb4822ba7f1b10a89139a7311ebaea386e174e742887e60838ac13c4493758259cb18e2a9ee65a8ab918dcf0ab68292b5e75
-
SSDEEP
3072:sW2GyYOcvYmSP6hpXgXwgZjtetXM4b7BdIFJ:sW2h2ScggD1sJ
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3352 AcroRd32.exe 3352 AcroRd32.exe 3352 AcroRd32.exe 3352 AcroRd32.exe 3352 AcroRd32.exe 3352 AcroRd32.exe 3352 AcroRd32.exe 3352 AcroRd32.exe 3352 AcroRd32.exe 3352 AcroRd32.exe 3352 AcroRd32.exe 3352 AcroRd32.exe 3352 AcroRd32.exe 3352 AcroRd32.exe 3352 AcroRd32.exe 3352 AcroRd32.exe 3352 AcroRd32.exe 3352 AcroRd32.exe 3352 AcroRd32.exe 3352 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3352 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3352 AcroRd32.exe 3352 AcroRd32.exe 3352 AcroRd32.exe 3352 AcroRd32.exe 3352 AcroRd32.exe 3352 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3352 wrote to memory of 4644 3352 AcroRd32.exe 79 PID 3352 wrote to memory of 4644 3352 AcroRd32.exe 79 PID 3352 wrote to memory of 4644 3352 AcroRd32.exe 79 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4884 4644 RdrCEF.exe 82 PID 4644 wrote to memory of 4928 4644 RdrCEF.exe 83 PID 4644 wrote to memory of 4928 4644 RdrCEF.exe 83 PID 4644 wrote to memory of 4928 4644 RdrCEF.exe 83 PID 4644 wrote to memory of 4928 4644 RdrCEF.exe 83 PID 4644 wrote to memory of 4928 4644 RdrCEF.exe 83 PID 4644 wrote to memory of 4928 4644 RdrCEF.exe 83 PID 4644 wrote to memory of 4928 4644 RdrCEF.exe 83 PID 4644 wrote to memory of 4928 4644 RdrCEF.exe 83 PID 4644 wrote to memory of 4928 4644 RdrCEF.exe 83 PID 4644 wrote to memory of 4928 4644 RdrCEF.exe 83 PID 4644 wrote to memory of 4928 4644 RdrCEF.exe 83 PID 4644 wrote to memory of 4928 4644 RdrCEF.exe 83 PID 4644 wrote to memory of 4928 4644 RdrCEF.exe 83 PID 4644 wrote to memory of 4928 4644 RdrCEF.exe 83 PID 4644 wrote to memory of 4928 4644 RdrCEF.exe 83 PID 4644 wrote to memory of 4928 4644 RdrCEF.exe 83 PID 4644 wrote to memory of 4928 4644 RdrCEF.exe 83 PID 4644 wrote to memory of 4928 4644 RdrCEF.exe 83 PID 4644 wrote to memory of 4928 4644 RdrCEF.exe 83 PID 4644 wrote to memory of 4928 4644 RdrCEF.exe 83
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2128A82159EF5F38F558622F77EB7E76BA1F65F82309AE5B0D02B8FCB9626072.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=02F289A628B2E7BC34AE91E95E818154 --mojo-platform-channel-handle=1724 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4884
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=32DFA26E2D858789278321AD8C941571 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=32DFA26E2D858789278321AD8C941571 --renderer-client-id=2 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job /prefetch:13⤵PID:4928
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=3BFFE33405B0F766741F514851F6E22F --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=3BFFE33405B0F766741F514851F6E22F --renderer-client-id=4 --mojo-platform-channel-handle=2300 --allow-no-sandbox-job /prefetch:13⤵PID:1452
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0A0C292036511589469A64030B605D0B --mojo-platform-channel-handle=2436 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1144
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=016BDA2BAF34BA011509DE5177ED300B --mojo-platform-channel-handle=2552 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2952
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=24D3C31261F797850D06CB5E5AE75C34 --mojo-platform-channel-handle=1848 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1816
-
-