Analysis
-
max time kernel
165s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 19:14
Behavioral task
behavioral1
Sample
NEAS.cf6c08472f7d77cdac5a4e321de92df0.pdf
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.cf6c08472f7d77cdac5a4e321de92df0.pdf
Resource
win10v2004-20231023-en
General
-
Target
NEAS.cf6c08472f7d77cdac5a4e321de92df0.pdf
-
Size
114KB
-
MD5
cf6c08472f7d77cdac5a4e321de92df0
-
SHA1
b5303b31f8b62a1b9216c01929828d073b7b0066
-
SHA256
117eee15be7b677557a6bff2dc33b12b3cb9f71a2dd456e131f0208d6d15a4a5
-
SHA512
a9379b795560a38638910791e16960f59a55df0b6f02893d80d074395eec9689cd4aedd7a4313b5a3649ec08a88fe89a440e3201a870ef948e4f41a3ee1da8c5
-
SSDEEP
1536:u897i5pJT7SCgsq0/dgeahjm0/jnaemCBmjz7hMJ1qXjZmnfhUNjQYdob9AxH:u8pi56CLq01ahjnvBmH7mmjZmfeQ+ob8
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3552 AcroRd32.exe 3552 AcroRd32.exe 3552 AcroRd32.exe 3552 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\NEAS.cf6c08472f7d77cdac5a4e321de92df0.pdf"1⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:3552