Analysis
-
max time kernel
162s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2023 20:04
Behavioral task
behavioral1
Sample
NEAS.5f38578ee2ca0b858ed6d178e856a030_JC.pdf
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.5f38578ee2ca0b858ed6d178e856a030_JC.pdf
Resource
win10v2004-20231023-en
General
-
Target
NEAS.5f38578ee2ca0b858ed6d178e856a030_JC.pdf
-
Size
119KB
-
MD5
5f38578ee2ca0b858ed6d178e856a030
-
SHA1
2cb1836796ae4ad6f06d29d582c806d4bcc71e71
-
SHA256
76538f55e502191a9e6f29debb681081c8b0653757efabc17b92b30f3c8eacbe
-
SHA512
92591efa2005b3967446d1142b425afb38daf6ecd7708a301ed8b45a603604ebb50a2751972c9e60fe14382c0064eb31a315a68ebbcbe7af1d2d95c4b0ac5b9e
-
SSDEEP
1536:M80m3GtfiWmX2RgBkLZavod+VBJ3M37XMOANB7nQF5bnCem7sPzMTL5Hr7tZb:d0jIkU3Vb3M3TNwc5DCemoGljb
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4636 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4636 AcroRd32.exe 4636 AcroRd32.exe 4636 AcroRd32.exe 4636 AcroRd32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4636 wrote to memory of 5100 4636 AcroRd32.exe 106 PID 4636 wrote to memory of 5100 4636 AcroRd32.exe 106 PID 4636 wrote to memory of 5100 4636 AcroRd32.exe 106 PID 4636 wrote to memory of 5072 4636 AcroRd32.exe 107 PID 4636 wrote to memory of 5072 4636 AcroRd32.exe 107 PID 4636 wrote to memory of 5072 4636 AcroRd32.exe 107
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\NEAS.5f38578ee2ca0b858ed6d178e856a030_JC.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:5100
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:5072
-