Analysis
-
max time kernel
37s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2023, 18:01
Behavioral task
behavioral1
Sample
NEAS.50ecc58c9add5adb8ff7417e05f78e70.pdf
Resource
win7-20231020-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.50ecc58c9add5adb8ff7417e05f78e70.pdf
Resource
win10v2004-20230915-en
5 signatures
150 seconds
General
-
Target
NEAS.50ecc58c9add5adb8ff7417e05f78e70.pdf
-
Size
506KB
-
MD5
50ecc58c9add5adb8ff7417e05f78e70
-
SHA1
aa0dbb3420a97a50f8d9c08783180c305dd5f7a9
-
SHA256
efbcb1954c0ef2fe369b4ba1418b44203d914412f9b667a4777e1b7933344829
-
SHA512
53e9aa17d8e3c08d3afa15269f49a7bdacbce64e0ab66e32cda01947b01c6d00a111b2f54ae7e2d32a1c41bbb411dc8ad09ed845787f5c4d1f8eb0cad9036b30
-
SSDEEP
12288:WaZ1mmDI7ERuKuWZ94xGYTq3lamHl/j2j098J2:RZ+fWZYzMlak
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 228 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 228 AcroRd32.exe 228 AcroRd32.exe 228 AcroRd32.exe 228 AcroRd32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 228 wrote to memory of 2308 228 AcroRd32.exe 88 PID 228 wrote to memory of 2308 228 AcroRd32.exe 88 PID 228 wrote to memory of 2308 228 AcroRd32.exe 88
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\NEAS.50ecc58c9add5adb8ff7417e05f78e70.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:2308
-