Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 14:08
Behavioral task
behavioral1
Sample
b81df22ed79ee12e7836b1b3bc8e12ba.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b81df22ed79ee12e7836b1b3bc8e12ba.pdf
Resource
win10v2004-20231215-en
General
-
Target
b81df22ed79ee12e7836b1b3bc8e12ba.pdf
-
Size
79KB
-
MD5
b81df22ed79ee12e7836b1b3bc8e12ba
-
SHA1
9c4eaca7852aff8e74c1f6c1bc80f7bd1f73b0f4
-
SHA256
4cc93fa4fbc2c951be1187ed9f76eabf0f0c58ee2252a08150810a3f6ea9a48e
-
SHA512
8eee818339c94553d10d6fdc6907e66a54e7ddbefc815662d5ef70789d32ac568c26b08078e342edf41e3ee361296c52125999961f526f34d2bea2407979f722
-
SSDEEP
1536:fG0GighkA8FUkZM4Uuqm3QXWqXHCkO4LM2BeSPp+18U+QXNPEi1PgzKKy7R:0t8eh4zQxX1lMzKpHU5XO6oWR
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4752 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe 4752 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4752 wrote to memory of 4012 4752 AcroRd32.exe 96 PID 4752 wrote to memory of 4012 4752 AcroRd32.exe 96 PID 4752 wrote to memory of 4012 4752 AcroRd32.exe 96 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 4440 4012 RdrCEF.exe 98 PID 4012 wrote to memory of 1204 4012 RdrCEF.exe 97 PID 4012 wrote to memory of 1204 4012 RdrCEF.exe 97 PID 4012 wrote to memory of 1204 4012 RdrCEF.exe 97 PID 4012 wrote to memory of 1204 4012 RdrCEF.exe 97 PID 4012 wrote to memory of 1204 4012 RdrCEF.exe 97 PID 4012 wrote to memory of 1204 4012 RdrCEF.exe 97 PID 4012 wrote to memory of 1204 4012 RdrCEF.exe 97 PID 4012 wrote to memory of 1204 4012 RdrCEF.exe 97 PID 4012 wrote to memory of 1204 4012 RdrCEF.exe 97 PID 4012 wrote to memory of 1204 4012 RdrCEF.exe 97 PID 4012 wrote to memory of 1204 4012 RdrCEF.exe 97 PID 4012 wrote to memory of 1204 4012 RdrCEF.exe 97 PID 4012 wrote to memory of 1204 4012 RdrCEF.exe 97 PID 4012 wrote to memory of 1204 4012 RdrCEF.exe 97 PID 4012 wrote to memory of 1204 4012 RdrCEF.exe 97 PID 4012 wrote to memory of 1204 4012 RdrCEF.exe 97 PID 4012 wrote to memory of 1204 4012 RdrCEF.exe 97 PID 4012 wrote to memory of 1204 4012 RdrCEF.exe 97 PID 4012 wrote to memory of 1204 4012 RdrCEF.exe 97 PID 4012 wrote to memory of 1204 4012 RdrCEF.exe 97
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\b81df22ed79ee12e7836b1b3bc8e12ba.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=3DC327816279F35B2E84E7F73112A1CF --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=3DC327816279F35B2E84E7F73112A1CF --renderer-client-id=2 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job /prefetch:13⤵PID:1204
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8ACB3A411E2A3F757C98CF178AFEF005 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4440
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A57CC75363A5E5427698A302C24BDCEB --mojo-platform-channel-handle=2296 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3672
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A82ADADE6937CE3ABE709330FD468730 --mojo-platform-channel-handle=2436 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3272
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=0FD21210736265728F965B55CDBAE046 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=0FD21210736265728F965B55CDBAE046 --renderer-client-id=5 --mojo-platform-channel-handle=1852 --allow-no-sandbox-job /prefetch:13⤵PID:5064
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=725F7DB91974B7F8256C362F126CC946 --mojo-platform-channel-handle=2652 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4348
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5de7d60e44b2fe4dda25b5770083a765f
SHA17a151d3a14dab9af39e438df2ced924bae99a823
SHA256b7abb58effb58fb597dcfe24608b21374d300be2c727698584888c80fd8d4410
SHA512b22f5617206dca1fd06a1a9315a265f504d67d9d51dbaf1cc8c9b0d3701d16e9b9492e3c37f47f2bafff68631526bfccf911dbb4b221130b1add3f40b02b37dc