Analysis
-
max time kernel
171s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2023 10:34
Behavioral task
behavioral1
Sample
087eb7b051f3b52b91b59477583baacc.pdf
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
087eb7b051f3b52b91b59477583baacc.pdf
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
087eb7b051f3b52b91b59477583baacc.pdf
-
Size
80KB
-
MD5
087eb7b051f3b52b91b59477583baacc
-
SHA1
a0cdbdd727a01f054cfe0fb23721fbe10c6cf6c0
-
SHA256
06cb1a6487fe59a789d14bd31839129a24f7f1462231235937bd64fc59e0f367
-
SHA512
87a01617022eeb85e8f0d291727f6010f7cd0e8820b6bdfb6077f9b9bcf9f2d2bb7ca95a837fc784f03d050dbdb05395ec64fc04753a527b173d3650bdbf4f92
-
SSDEEP
1536:12pFDKzCyrnVdCR2TuBLCLWQSrt8fAUKQ79dbNLV/tnzwPW2f3e358omOLWQpOCV:opFDKGyrVd82ELCZSrGfdhL+fO358o99
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2856 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2856 AcroRd32.exe 2856 AcroRd32.exe 2856 AcroRd32.exe 2856 AcroRd32.exe 2856 AcroRd32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2856 wrote to memory of 3060 2856 AcroRd32.exe 96 PID 2856 wrote to memory of 3060 2856 AcroRd32.exe 96 PID 2856 wrote to memory of 3060 2856 AcroRd32.exe 96 PID 2856 wrote to memory of 3860 2856 AcroRd32.exe 97 PID 2856 wrote to memory of 3860 2856 AcroRd32.exe 97 PID 2856 wrote to memory of 3860 2856 AcroRd32.exe 97
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\087eb7b051f3b52b91b59477583baacc.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:3060
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:3860
-