Analysis
-
max time kernel
146s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 03:15
Behavioral task
behavioral1
Sample
025350a1f22f35ef3d5452f112a31795.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
025350a1f22f35ef3d5452f112a31795.pdf
Resource
win10v2004-20231215-en
General
-
Target
025350a1f22f35ef3d5452f112a31795.pdf
-
Size
80KB
-
MD5
025350a1f22f35ef3d5452f112a31795
-
SHA1
4168f84a63cf2a2bb5c2a56b8d9202429962a5a1
-
SHA256
8dbf196cbddeb6022501236b93de70db36169a71d0b2dacf1dcc03f73a7b094b
-
SHA512
48432cca599f2416e83ef2f42fa84caff6aa240a65f82a902c9d5fa66bd4f972c87b9546f68392ebd9816546ba2a654c7b8d5d8a59a371bc27491af2343930a3
-
SSDEEP
1536:zmnTE2ENE77OV0tFU+Kb65OKINFBozTFxuxQbWwqfQ8R57WG9CQFe8b1ntX:kTEGOVXvKWF0xu6bWw+QS571lFe8p1
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 456 AcroRd32.exe 456 AcroRd32.exe 456 AcroRd32.exe 456 AcroRd32.exe 456 AcroRd32.exe 456 AcroRd32.exe 456 AcroRd32.exe 456 AcroRd32.exe 456 AcroRd32.exe 456 AcroRd32.exe 456 AcroRd32.exe 456 AcroRd32.exe 456 AcroRd32.exe 456 AcroRd32.exe 456 AcroRd32.exe 456 AcroRd32.exe 456 AcroRd32.exe 456 AcroRd32.exe 456 AcroRd32.exe 456 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 456 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 456 AcroRd32.exe 456 AcroRd32.exe 456 AcroRd32.exe 456 AcroRd32.exe 456 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 456 wrote to memory of 8 456 AcroRd32.exe 91 PID 456 wrote to memory of 8 456 AcroRd32.exe 91 PID 456 wrote to memory of 8 456 AcroRd32.exe 91 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 4876 8 RdrCEF.exe 92 PID 8 wrote to memory of 3880 8 RdrCEF.exe 93 PID 8 wrote to memory of 3880 8 RdrCEF.exe 93 PID 8 wrote to memory of 3880 8 RdrCEF.exe 93 PID 8 wrote to memory of 3880 8 RdrCEF.exe 93 PID 8 wrote to memory of 3880 8 RdrCEF.exe 93 PID 8 wrote to memory of 3880 8 RdrCEF.exe 93 PID 8 wrote to memory of 3880 8 RdrCEF.exe 93 PID 8 wrote to memory of 3880 8 RdrCEF.exe 93 PID 8 wrote to memory of 3880 8 RdrCEF.exe 93 PID 8 wrote to memory of 3880 8 RdrCEF.exe 93 PID 8 wrote to memory of 3880 8 RdrCEF.exe 93 PID 8 wrote to memory of 3880 8 RdrCEF.exe 93 PID 8 wrote to memory of 3880 8 RdrCEF.exe 93 PID 8 wrote to memory of 3880 8 RdrCEF.exe 93 PID 8 wrote to memory of 3880 8 RdrCEF.exe 93 PID 8 wrote to memory of 3880 8 RdrCEF.exe 93 PID 8 wrote to memory of 3880 8 RdrCEF.exe 93 PID 8 wrote to memory of 3880 8 RdrCEF.exe 93 PID 8 wrote to memory of 3880 8 RdrCEF.exe 93 PID 8 wrote to memory of 3880 8 RdrCEF.exe 93
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\025350a1f22f35ef3d5452f112a31795.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9C16AD77428A554571D16983010519F0 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4876
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=7BF8DAD6CDC2AF07D7355DDD75E15AD1 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=7BF8DAD6CDC2AF07D7355DDD75E15AD1 --renderer-client-id=2 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job /prefetch:13⤵PID:3880
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=6D3ADC7D8A9790BE2B981B578A8203E3 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=6D3ADC7D8A9790BE2B981B578A8203E3 --renderer-client-id=5 --mojo-platform-channel-handle=1848 --allow-no-sandbox-job /prefetch:13⤵PID:2828
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=ED4456AB774E9F994B6451C37DE2D74E --mojo-platform-channel-handle=2296 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3732
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C45A67F4E83BD184B3500383EAF6C360 --mojo-platform-channel-handle=2424 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3672
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7F46C4E29EEFC57F36D3E061CBA68365 --mojo-platform-channel-handle=2344 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5bfd8ce43f7e46e850306015949a75a6a
SHA115d1696fcef71ed07a7eac0a27922ef5f25e47d3
SHA2565701c0577b4931d312c1a0c858f0933d37dbe465adce55a91c5565b4f55ab517
SHA51202a4c6eae8645f40cafb06fe0ffa6eb559dc2dafa39c7fb49b79e97fee36fd6ee3f18e9218e21648948251f2e9944c47bb474c5299b12c63b6ece64f3b5d9479
-
Filesize
5KB
MD5fc14b0faa2e7be6479a5cd957de2c59e
SHA1614637c4e1250ff09d8541c418c7ca1b2ce58e93
SHA256910e224b2ce0be8b22f2fb9a4672fa2837573cc881cb4126909ae55f76c8477c
SHA5129bca535f236e3f0112ad2bdefbcd640c3bdf40cc0fe21fe69b5e8a6134eaa386cc53f80fd17d43c7f88c3bad51908dfa94655e9d1eadc59047ee20e32af63057
-
Filesize
4KB
MD594e5dd26a3327664ad44655d7d1fa47c
SHA12f4fe5e7cc1780ef722c6ac8ce11cded515ad3ce
SHA2561b955ff12056c25a9dc0948ea94c4525c52d6bd90139d4287d48d0e706ea63d3
SHA512efa806960fb9ed96590fb38281aca2e8b4b6381052c2f3f593da97a6d33ce488d2885df9c1344a6ce6af68f683caecbfce788133905265b7bcf6cc1a9fb9c84d