Analysis
-
max time kernel
161s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 01:09
Behavioral task
behavioral1
Sample
1156e213796ef87ad5b42204f38be2a8cccf0a20c21cf547d1169fdf3b2ffe70.pdf
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1156e213796ef87ad5b42204f38be2a8cccf0a20c21cf547d1169fdf3b2ffe70.pdf
Resource
win10v2004-20230915-en
General
-
Target
1156e213796ef87ad5b42204f38be2a8cccf0a20c21cf547d1169fdf3b2ffe70.pdf
-
Size
16KB
-
MD5
68ed60b17201c7b87261ee8e5a582243
-
SHA1
8287421903c294e58f6217d78c749954d4b6e339
-
SHA256
1156e213796ef87ad5b42204f38be2a8cccf0a20c21cf547d1169fdf3b2ffe70
-
SHA512
1fb94850da117a0e461f918f223a52640f2019c3936fb161a2d9898bbc802d3e0546769c23dfc2a6362319e0053a07eebbf29876870214ebae4b9d7de527d06e
-
SSDEEP
384:jxfVsuD4nuVC2GGGGzoTLb1zM7cfZsOvcAQd68/EZW:jxGKC2GGGGz8b1zEcjvcRw8B
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2808 msedge.exe 2808 msedge.exe 4584 msedge.exe 4584 msedge.exe 4816 identity_helper.exe 4816 identity_helper.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe 4584 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 236 AcroRd32.exe 236 AcroRd32.exe 236 AcroRd32.exe 236 AcroRd32.exe 236 AcroRd32.exe 236 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 236 wrote to memory of 4584 236 AcroRd32.exe 95 PID 236 wrote to memory of 4584 236 AcroRd32.exe 95 PID 4584 wrote to memory of 3660 4584 msedge.exe 97 PID 4584 wrote to memory of 3660 4584 msedge.exe 97 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2784 4584 msedge.exe 98 PID 4584 wrote to memory of 2808 4584 msedge.exe 99 PID 4584 wrote to memory of 2808 4584 msedge.exe 99 PID 4584 wrote to memory of 3800 4584 msedge.exe 100 PID 4584 wrote to memory of 3800 4584 msedge.exe 100 PID 4584 wrote to memory of 3800 4584 msedge.exe 100 PID 4584 wrote to memory of 3800 4584 msedge.exe 100 PID 4584 wrote to memory of 3800 4584 msedge.exe 100 PID 4584 wrote to memory of 3800 4584 msedge.exe 100 PID 4584 wrote to memory of 3800 4584 msedge.exe 100 PID 4584 wrote to memory of 3800 4584 msedge.exe 100 PID 4584 wrote to memory of 3800 4584 msedge.exe 100 PID 4584 wrote to memory of 3800 4584 msedge.exe 100 PID 4584 wrote to memory of 3800 4584 msedge.exe 100 PID 4584 wrote to memory of 3800 4584 msedge.exe 100 PID 4584 wrote to memory of 3800 4584 msedge.exe 100 PID 4584 wrote to memory of 3800 4584 msedge.exe 100 PID 4584 wrote to memory of 3800 4584 msedge.exe 100 PID 4584 wrote to memory of 3800 4584 msedge.exe 100 PID 4584 wrote to memory of 3800 4584 msedge.exe 100 PID 4584 wrote to memory of 3800 4584 msedge.exe 100
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1156e213796ef87ad5b42204f38be2a8cccf0a20c21cf547d1169fdf3b2ffe70.pdf"1⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drakesoftwares.blogspot.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8003046f8,0x7ff800304708,0x7ff8003047183⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,10510920857706984396,11973748464791653668,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:23⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,10510920857706984396,11973748464791653668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,10510920857706984396,11973748464791653668,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:83⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10510920857706984396,11973748464791653668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:13⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10510920857706984396,11973748464791653668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:13⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,10510920857706984396,11973748464791653668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:83⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,10510920857706984396,11973748464791653668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10510920857706984396,11973748464791653668,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:13⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10510920857706984396,11973748464791653668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:13⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10510920857706984396,11973748464791653668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:13⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10510920857706984396,11973748464791653668,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:13⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,10510920857706984396,11973748464791653668,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5644 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4132
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53d5af55f794f9a10c5943d2f80dde5c5
SHA15252adf87d6bd769f2c39b9e8eba77b087a0160d
SHA25643e50edafcaaeae9fcd4dce5b99bf14fe79dae1401019443f31aa9ff81347764
SHA5122e2e09a00db732ff934da1e6ab8617fb3c8de482f9667a2c987435d0a5d67550b4bfd66e8b4475012b60908c24e39dff58e2f2ffa55f13ffc55caae1be630c71
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD576cb6a3dbe9468eb377d65c65db399b8
SHA1d8d3e71b412b0d0d0eeab46a08cd111bbbad07ed
SHA256240e0069247b5fecd2113636f124a6440732af88e385065a7865bfa72c22b278
SHA5120b901a8d3ebc44d8f7f8a279cc85f107726303fae0ec2f81ce7a4ef83fd5d031402ff6bbd0e41721b6f66a561a5693c619bc7f54280a79bb60a1023f5a558246
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD50650758cf73c937f81e93f5849f81713
SHA1c56d16e7704aad51b7586c367d682c78a262f34a
SHA256e12d3dcd5caf807cc2aafbabdd857cbbedc68192d63b8cdc4ac588be6b5fb8a2
SHA51286e4f40b008b3574989608becf50140c5798add3640f8376e87a0b53f3e43bc3825041dc5ecb57424bb98864e544e135acfa5412945357e4380f01243c3157c7
-
Filesize
6KB
MD568e62a563eeec40a9b944dbc95c448db
SHA1c13b200c70f2787952805cebbce842211255ed0e
SHA256c7aef79e5aa9136d3e8e36a21116b4470234901657f3d499a147c80d00699720
SHA5120f45cdaadba0a213d9e0c1260edad844fadb19e85e743cf550051b9965c597f013d52ac6cd79c9a28576a9657442c00db4018ddd566123d2ee0cc0538593ba4a
-
Filesize
5KB
MD5eec82c5d02a73677fefbfb973a7a0e0e
SHA1176f747c2fa029eefd80901441be7854975eb06a
SHA256a26c3226fe18369a7084acbd216e6090e5bb2598704714110d13499689d7814e
SHA512a6896801d35ee6e570e9012cb6f0a106248e9a634a7317d6a5c874cf4a2c54a189e3625196fc0a28c2ffcebc3722f75ff4959cc7fe7112999e41d8d7ee95e365
-
Filesize
6KB
MD53a5f4565391f339f83d7d9c4c31e4e69
SHA15a8ef1b8011d6021be9a0cb68d2c169a515e1f8c
SHA256c6bc3f613a1ad2ba7526e3c4145b6e17cf45101bfc7aa2b50cde4a9b886f75d5
SHA51263c1d3fc4ebcd20a49ece21ebae457194987a07276228ac69c3573312956767b251a4bc295a16ad688cc6a7e87189e87cd6d5ee0bcf62c21e6043d3f1c208e0b
-
Filesize
24KB
MD510f5b64000466c1e6da25fb5a0115924
SHA1cb253bacf2b087c4040eb3c6a192924234f68639
SHA256d818b1cebb2d1e2b269f2e41654702a0df261e63ba2a479f34b75563265ee46b
SHA5128a8d230594d6fade63ecd63ba60985a7ccd1353de8d0a119543985bf182fdbb45f38ccc96441c24f0792ea1c449de69563c38348c2bedb2845522a2f83a149db
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ae763339beba63655574d9979734bdd5
SHA1f06cd3deb9735b2264c94ffbbafd9c021ebfa805
SHA256ff0788e420be36d87c187443dece5233f4c7b87def50dc4a569a8fd41f9b6791
SHA512037130cbe0eef882199f31e660c5ba85eec6be0f2b03ed8769c4e4988847128de33b8d22fa2e6b9718046741dbf1520bed2377b1cd621efea8553b0e60f8cf86
-
Filesize
10KB
MD54119382731f2627fb96f654292767e0b
SHA19f2b6e18941984eefb423b3f079049a4dcd4b93c
SHA256e6a6eb31f4568ce3da5b6a164e4ae25e8d142b895ce60f650313a6d8de9b0934
SHA512c30cbad0ff8c2e36ff76f09baf482615498ea0932e46326cd552033531cb418ab92ef5c4ff54085dc0dab554d4b712205871c67d35618a31fadfc129b11b7303