Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 04:40
Behavioral task
behavioral1
Sample
663822fc1dea16dd451c7ef58c6a1815.pdf
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
663822fc1dea16dd451c7ef58c6a1815.pdf
Resource
win10v2004-20231215-en
General
-
Target
663822fc1dea16dd451c7ef58c6a1815.pdf
-
Size
36KB
-
MD5
663822fc1dea16dd451c7ef58c6a1815
-
SHA1
3d98a007062ad7b3617eb1bed045c3871c19e12e
-
SHA256
d9fd130985cbe661252f492e4e43dc31a40026527a7345cf0553b85c4ddb8926
-
SHA512
4afce09d7373028138947ccea24bfa179ee11597a8939cb07fb6f73d4f00556ee813d2d6cfc20d2967267c076becffe59052f2041bf6d6052193e4c7807146c2
-
SSDEEP
768:GSPOXNFlAl0WccyaENfwFLJKOtUmMsKmQEnnI9mw2d6p+dZvKeo5L1d4q+k8893:GSPOXNnAllhyaENfwFL0OtUmsdS5wo63
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3008 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe 3008 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3008 wrote to memory of 3876 3008 AcroRd32.exe 93 PID 3008 wrote to memory of 3876 3008 AcroRd32.exe 93 PID 3008 wrote to memory of 3876 3008 AcroRd32.exe 93 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 1308 3876 RdrCEF.exe 101 PID 3876 wrote to memory of 344 3876 RdrCEF.exe 95 PID 3876 wrote to memory of 344 3876 RdrCEF.exe 95 PID 3876 wrote to memory of 344 3876 RdrCEF.exe 95 PID 3876 wrote to memory of 344 3876 RdrCEF.exe 95 PID 3876 wrote to memory of 344 3876 RdrCEF.exe 95 PID 3876 wrote to memory of 344 3876 RdrCEF.exe 95 PID 3876 wrote to memory of 344 3876 RdrCEF.exe 95 PID 3876 wrote to memory of 344 3876 RdrCEF.exe 95 PID 3876 wrote to memory of 344 3876 RdrCEF.exe 95 PID 3876 wrote to memory of 344 3876 RdrCEF.exe 95 PID 3876 wrote to memory of 344 3876 RdrCEF.exe 95 PID 3876 wrote to memory of 344 3876 RdrCEF.exe 95 PID 3876 wrote to memory of 344 3876 RdrCEF.exe 95 PID 3876 wrote to memory of 344 3876 RdrCEF.exe 95 PID 3876 wrote to memory of 344 3876 RdrCEF.exe 95 PID 3876 wrote to memory of 344 3876 RdrCEF.exe 95 PID 3876 wrote to memory of 344 3876 RdrCEF.exe 95 PID 3876 wrote to memory of 344 3876 RdrCEF.exe 95 PID 3876 wrote to memory of 344 3876 RdrCEF.exe 95 PID 3876 wrote to memory of 344 3876 RdrCEF.exe 95
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\663822fc1dea16dd451c7ef58c6a1815.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=897CA02985006BC84C994D9111D922C7 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1308
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=137E4D4ECF9BA12EF54C5DEB3C9D8F50 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=137E4D4ECF9BA12EF54C5DEB3C9D8F50 --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:13⤵PID:344
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=822A0F4380301514F1D2BE2D02B9BAE6 --mojo-platform-channel-handle=2296 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:816
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=62A10C083C9B06D4E4EDD75DE2696AED --mojo-platform-channel-handle=1796 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3792
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FEE0FEBD14AC66AA4532BA7BECF8264A --mojo-platform-channel-handle=1736 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1976
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=067DC7D24AD163EBC3A9E0946001812B --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=067DC7D24AD163EBC3A9E0946001812B --renderer-client-id=8 --mojo-platform-channel-handle=1796 --allow-no-sandbox-job /prefetch:13⤵PID:3352
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4432
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv rTIm1cODFUOz7Ruarhzjow.0.11⤵PID:1308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5780d775f2ec016b80738845302097492
SHA16840d4ba8b1536babb0d718879faacd8c08465fe
SHA2567014da4feddc633c8e710f6699ae186367131fcf8d7d3af4fb2d5bd82357c2f6
SHA512554551610093c9f8cfa5010e0e36823567546b0ea1086faa28806aa74587f11b072cc736cacdd5d8ada9db78b029779a4940a3f8e0eddcc2d9a1d16585a76924
-
Filesize
35KB
MD561d1feffb2330a72c7426042e65bc1f8
SHA1c2bbcf2dc43d0cf7a29992d63f5f387964670271
SHA256ecdaa3320a06fd20c7427b2d7059a0e3f83eff0270452ea168739655e54ac623
SHA512b62a3df0fad7b2cd9ab3d0bdd7354743418d8f2733f92578ba80c05165c2385adccf34f51346bf37bcd7a2c4a82eb405c8a90ee69a6dee6bcdd28ef47d754751