Analysis
-
max time kernel
140s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 14:27
Behavioral task
behavioral1
Sample
c27fd1440421dedbab1b685329bf40d1.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c27fd1440421dedbab1b685329bf40d1.pdf
Resource
win10v2004-20231215-en
General
-
Target
c27fd1440421dedbab1b685329bf40d1.pdf
-
Size
34KB
-
MD5
c27fd1440421dedbab1b685329bf40d1
-
SHA1
fe037f8e3af24271a7fcaecc7d113e651d664a30
-
SHA256
350f1666ce4006a242c0f89af5f8622b6a7bed2b62acf53b644376382c465760
-
SHA512
9e19d150e9282f4be70a26c5d55666787d51f3f298495a7ead7da811260568b08dfa17384343395049a9f5a7215b28f74dd15e578aebf5e8e32258eee20c0ea4
-
SSDEEP
768:u1HBmdEue325zsLH0qO4hGNn0EwvuF8jqcCfPgplxC0JUD7f:u3MERg4gGFvuqmczxC0JUD7f
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1552 AcroRd32.exe 1552 AcroRd32.exe 1552 AcroRd32.exe 1552 AcroRd32.exe 1552 AcroRd32.exe 1552 AcroRd32.exe 1552 AcroRd32.exe 1552 AcroRd32.exe 1552 AcroRd32.exe 1552 AcroRd32.exe 1552 AcroRd32.exe 1552 AcroRd32.exe 1552 AcroRd32.exe 1552 AcroRd32.exe 1552 AcroRd32.exe 1552 AcroRd32.exe 1552 AcroRd32.exe 1552 AcroRd32.exe 1552 AcroRd32.exe 1552 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1552 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1552 AcroRd32.exe 1552 AcroRd32.exe 1552 AcroRd32.exe 1552 AcroRd32.exe 1552 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1552 wrote to memory of 2344 1552 AcroRd32.exe 93 PID 1552 wrote to memory of 2344 1552 AcroRd32.exe 93 PID 1552 wrote to memory of 2344 1552 AcroRd32.exe 93 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 3196 2344 RdrCEF.exe 95 PID 2344 wrote to memory of 2812 2344 RdrCEF.exe 94 PID 2344 wrote to memory of 2812 2344 RdrCEF.exe 94 PID 2344 wrote to memory of 2812 2344 RdrCEF.exe 94 PID 2344 wrote to memory of 2812 2344 RdrCEF.exe 94 PID 2344 wrote to memory of 2812 2344 RdrCEF.exe 94 PID 2344 wrote to memory of 2812 2344 RdrCEF.exe 94 PID 2344 wrote to memory of 2812 2344 RdrCEF.exe 94 PID 2344 wrote to memory of 2812 2344 RdrCEF.exe 94 PID 2344 wrote to memory of 2812 2344 RdrCEF.exe 94 PID 2344 wrote to memory of 2812 2344 RdrCEF.exe 94 PID 2344 wrote to memory of 2812 2344 RdrCEF.exe 94 PID 2344 wrote to memory of 2812 2344 RdrCEF.exe 94 PID 2344 wrote to memory of 2812 2344 RdrCEF.exe 94 PID 2344 wrote to memory of 2812 2344 RdrCEF.exe 94 PID 2344 wrote to memory of 2812 2344 RdrCEF.exe 94 PID 2344 wrote to memory of 2812 2344 RdrCEF.exe 94 PID 2344 wrote to memory of 2812 2344 RdrCEF.exe 94 PID 2344 wrote to memory of 2812 2344 RdrCEF.exe 94 PID 2344 wrote to memory of 2812 2344 RdrCEF.exe 94 PID 2344 wrote to memory of 2812 2344 RdrCEF.exe 94
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\c27fd1440421dedbab1b685329bf40d1.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=2F189055607B106E98FA2481B32E64B4 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=2F189055607B106E98FA2481B32E64B4 --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:13⤵PID:2812
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4D4F9C1BAC1E80F291BB28F461BCFF76 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3196
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BF6A8FCC1A94CFEA7E769E6AFA772CE5 --mojo-platform-channel-handle=2300 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2356
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=FEF4ED1081B5993616434B9F3225DD2F --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=FEF4ED1081B5993616434B9F3225DD2F --renderer-client-id=6 --mojo-platform-channel-handle=2324 --allow-no-sandbox-job /prefetch:13⤵PID:4792
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=ED20A80D9AA254E89040EE824FBCD06B --mojo-platform-channel-handle=2424 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4372
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=563EFE26A36F47CD6A2572B57BDE750D --mojo-platform-channel-handle=2440 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:904
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5580a377cfbe665e756c68e06bae99008
SHA1939981341700ab1164b42c8fc755405f4730eea5
SHA2560dccf45f41d0a226eba3108f72987f83987a8831e51d4b1b226249d827499a61
SHA5121a8ddc21ea0adb0c528c301794554039d452ed015ac8953a8f4bcce98e86b126ef6b93dbfc0518761747fc3691e7a633081accba0a0dba80d3aaea3254ceb092
-
Filesize
56KB
MD5c26ed30e7d5ab440480838636efc41db
SHA1c66e0d00b56abebfb60d2fcc5cf85ad31a0d6591
SHA2566a3c5c4a8e57f77ecc22078fbf603ecc31fb82d429bd87b7b4b9261447092aef
SHA51296cdb78bca3e01d4513c31661987e5646e6a8ff24708918aa0d66dfa3ca5d98af4862c9f38c4f41f933c345d2d3adfb1d34d1430b33f45f916f41a9872a030df
-
Filesize
40KB
MD5cb1c3b9618beb1e655382e939b31e5d0
SHA1aa5a5351d123bd3112a5c31021e58977a8893bfe
SHA256d2863790728b98d4aafcd547618e5161ce1ff12b07455a715ab1f90552e1077a
SHA512890d576b38bbdff0ebdba95746f711445ff75f3da0d7f5d4a6433d43e886e219f75e460e2c5c3b7350809154b55c63dce9d78a363402f7b52bdb649d3ec70033