Analysis
-
max time kernel
277s -
max time network
282s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-es -
resource tags
arch:x64arch:x86image:win10v2004-20231127-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
12-12-2023 08:31
Static task
static1
Behavioral task
behavioral1
Sample
CANNORDIC Trial order pres Nov23.pdf
Resource
win7-20231129-es
Behavioral task
behavioral2
Sample
CANNORDIC Trial order pres Nov23.pdf
Resource
win10v2004-20231127-es
General
-
Target
CANNORDIC Trial order pres Nov23.pdf
-
Size
1.6MB
-
MD5
39ca0398efd6eb48d66fb8b34c1d6586
-
SHA1
6c74b8ce56f09732047e1e8f6f7c35d99f06c057
-
SHA256
cb561cc628b70253a052c260b4048a4673471557d61fb3431077cb837e9e4da8
-
SHA512
dcb2fdca516f89a3668df95fdefdcb69026f1e9a6dbaa728ebe6f3412ee3a1c0aebde5947882a409ec4c088ba0c7f0d71c07d1a263f84443bdaff5a0a4946fd8
-
SSDEEP
24576:Q13uJmo/vGs09HVix/fchHSMzOC9/v4HBV0LjosvLuPntzTY+BfNt3byj7TabES3:Qs8sGHwcVzOeH4HujosDulzhBfKf23oq
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3360 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3360 AcroRd32.exe 3360 AcroRd32.exe 3360 AcroRd32.exe 3360 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\CANNORDIC Trial order pres Nov23.pdf"1⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3360