Analysis
-
max time kernel
147s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 03:40
Behavioral task
behavioral1
Sample
5ce6c1e17722c281059a58d469074927.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5ce6c1e17722c281059a58d469074927.pdf
Resource
win10v2004-20231215-en
General
-
Target
5ce6c1e17722c281059a58d469074927.pdf
-
Size
88KB
-
MD5
5ce6c1e17722c281059a58d469074927
-
SHA1
d2e19b3d217fd6ac3d8cce9177723c65582bbe3f
-
SHA256
b7026b8471262b9a5c61b8f5adce31de179fbda315fee25162341d8b7457d7fe
-
SHA512
7c9b41b2b0c7f94b553859b698c93536c35c4e25b96cd0e455220347e2ef20389d40bd9503e9b8f59b2ba82b0337e07a4e69f992bc5c03000960fc1b61816bf3
-
SSDEEP
1536:tD243ksbULTXSXBKgJrTIbVy3JaA0OYtQ07s5+bLIfuYSNfEPUvsro8o:g7sgLTXSXhJ38Ewhtf7s5MsfuYSVMUvj
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1940 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe 1940 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1940 wrote to memory of 1480 1940 AcroRd32.exe 91 PID 1940 wrote to memory of 1480 1940 AcroRd32.exe 91 PID 1940 wrote to memory of 1480 1940 AcroRd32.exe 91 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 2772 1480 RdrCEF.exe 93 PID 1480 wrote to memory of 3248 1480 RdrCEF.exe 92 PID 1480 wrote to memory of 3248 1480 RdrCEF.exe 92 PID 1480 wrote to memory of 3248 1480 RdrCEF.exe 92 PID 1480 wrote to memory of 3248 1480 RdrCEF.exe 92 PID 1480 wrote to memory of 3248 1480 RdrCEF.exe 92 PID 1480 wrote to memory of 3248 1480 RdrCEF.exe 92 PID 1480 wrote to memory of 3248 1480 RdrCEF.exe 92 PID 1480 wrote to memory of 3248 1480 RdrCEF.exe 92 PID 1480 wrote to memory of 3248 1480 RdrCEF.exe 92 PID 1480 wrote to memory of 3248 1480 RdrCEF.exe 92 PID 1480 wrote to memory of 3248 1480 RdrCEF.exe 92 PID 1480 wrote to memory of 3248 1480 RdrCEF.exe 92 PID 1480 wrote to memory of 3248 1480 RdrCEF.exe 92 PID 1480 wrote to memory of 3248 1480 RdrCEF.exe 92 PID 1480 wrote to memory of 3248 1480 RdrCEF.exe 92 PID 1480 wrote to memory of 3248 1480 RdrCEF.exe 92 PID 1480 wrote to memory of 3248 1480 RdrCEF.exe 92 PID 1480 wrote to memory of 3248 1480 RdrCEF.exe 92 PID 1480 wrote to memory of 3248 1480 RdrCEF.exe 92 PID 1480 wrote to memory of 3248 1480 RdrCEF.exe 92
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\5ce6c1e17722c281059a58d469074927.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=4C6257A5476DDEB85B11B94B25E60862 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=4C6257A5476DDEB85B11B94B25E60862 --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:13⤵PID:3248
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=71BA63DD2DF62B6BF5FC94FA08C38775 --mojo-platform-channel-handle=1736 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2772
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7E36DE3DCA96B67C543EB2C36B825366 --mojo-platform-channel-handle=2316 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2352
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=771F99EB2A6F0431EE183EA428CD8C8B --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=771F99EB2A6F0431EE183EA428CD8C8B --renderer-client-id=5 --mojo-platform-channel-handle=1868 --allow-no-sandbox-job /prefetch:13⤵PID:4100
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=601A42A3D192A411D0A63DE3D17E940F --mojo-platform-channel-handle=2572 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1484
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8EDA9F00A5A16F20D739DB4245209DD8 --mojo-platform-channel-handle=2704 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:5020
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b644a7969dca03d46be7e7cc7b301508
SHA12c0b283b3399e0c3246885b2ad66540720c0a0fa
SHA2562ebca4b8b66334df722363906457f3375d617bb1ddc2c112bb504d2c47bdaad7
SHA512faca81d0fcb04952c9229afed3db8a7ea09a072c4568b4ba49d4f77dde636dcd6173d1170d51a43b54d18e6f93aab7bf1de76d20107159bee687700fd3520f77
-
Filesize
33KB
MD52103060bb98ab29382f1abf523eede56
SHA14c0eae50e0092689c0748e7b51dfec9091aa2397
SHA256a9c12b3db9e077b1e85e9bda7200e05b7ec859c7b1092c306eb127c71747f89e
SHA5128bd5d898bd8769589bffaf2b4b91f935446c6d7dbf69098a4f4e1ae8f960098238358158fb0130e47c9118f64ed4518230a38d1c7a48a3470f0af2de9f6bb807
-
Filesize
53KB
MD57b7ec97dfd5e42fd7e7b95164a1a5df9
SHA13241b88985b7007c559a07a8281532779c4b2339
SHA25656723b27737e504600113eaa9a53304a9c08c790b04a3c03938aa979c0e68fb8
SHA5125cd57d02baca0e8f751ad532ff6454d014998e9cb2bc5b5e5a1667f6bf37423c52b39c4df7325c004dd931e89dc8bf9b97a98f95aa05a1cf91e76c9f1ff02ec3