Analysis
-
max time kernel
142s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 19:54
Behavioral task
behavioral1
Sample
397e37c73b4c98751a9e2edd839b1ca0.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
397e37c73b4c98751a9e2edd839b1ca0.pdf
Resource
win10v2004-20231215-en
General
-
Target
397e37c73b4c98751a9e2edd839b1ca0.pdf
-
Size
88KB
-
MD5
397e37c73b4c98751a9e2edd839b1ca0
-
SHA1
a7eee865736f56bb8b65a17e37995320c752d387
-
SHA256
4097c16a9f3df54a3404916ecc6e478782f1b1aebf8067e5e997843ffd49dc27
-
SHA512
5a291bcb59080f79ddd555849bb8f42de8aa7326ebd0101fba000e288ca978cdb1b5a86a4db060faf243f410557b123f1edc9106a4325a7183f120a8af65784d
-
SSDEEP
1536:M/VlsJL0Y4+Bfx9PLVzRyG2697VmNRsZS4z21Q8+MeWtGRhJTGedWWc2LzlWspOp:OPIxZVFyG26pVURgS47Qnehx02nM2C
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3596 AcroRd32.exe 3596 AcroRd32.exe 3596 AcroRd32.exe 3596 AcroRd32.exe 3596 AcroRd32.exe 3596 AcroRd32.exe 3596 AcroRd32.exe 3596 AcroRd32.exe 3596 AcroRd32.exe 3596 AcroRd32.exe 3596 AcroRd32.exe 3596 AcroRd32.exe 3596 AcroRd32.exe 3596 AcroRd32.exe 3596 AcroRd32.exe 3596 AcroRd32.exe 3596 AcroRd32.exe 3596 AcroRd32.exe 3596 AcroRd32.exe 3596 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3596 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3596 AcroRd32.exe 3596 AcroRd32.exe 3596 AcroRd32.exe 3596 AcroRd32.exe 3596 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3596 wrote to memory of 3232 3596 AcroRd32.exe 93 PID 3596 wrote to memory of 3232 3596 AcroRd32.exe 93 PID 3596 wrote to memory of 3232 3596 AcroRd32.exe 93 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 5084 3232 RdrCEF.exe 95 PID 3232 wrote to memory of 4948 3232 RdrCEF.exe 94 PID 3232 wrote to memory of 4948 3232 RdrCEF.exe 94 PID 3232 wrote to memory of 4948 3232 RdrCEF.exe 94 PID 3232 wrote to memory of 4948 3232 RdrCEF.exe 94 PID 3232 wrote to memory of 4948 3232 RdrCEF.exe 94 PID 3232 wrote to memory of 4948 3232 RdrCEF.exe 94 PID 3232 wrote to memory of 4948 3232 RdrCEF.exe 94 PID 3232 wrote to memory of 4948 3232 RdrCEF.exe 94 PID 3232 wrote to memory of 4948 3232 RdrCEF.exe 94 PID 3232 wrote to memory of 4948 3232 RdrCEF.exe 94 PID 3232 wrote to memory of 4948 3232 RdrCEF.exe 94 PID 3232 wrote to memory of 4948 3232 RdrCEF.exe 94 PID 3232 wrote to memory of 4948 3232 RdrCEF.exe 94 PID 3232 wrote to memory of 4948 3232 RdrCEF.exe 94 PID 3232 wrote to memory of 4948 3232 RdrCEF.exe 94 PID 3232 wrote to memory of 4948 3232 RdrCEF.exe 94 PID 3232 wrote to memory of 4948 3232 RdrCEF.exe 94 PID 3232 wrote to memory of 4948 3232 RdrCEF.exe 94 PID 3232 wrote to memory of 4948 3232 RdrCEF.exe 94 PID 3232 wrote to memory of 4948 3232 RdrCEF.exe 94
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\397e37c73b4c98751a9e2edd839b1ca0.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=319A585FE12070670F96DCA0FAB75F39 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=319A585FE12070670F96DCA0FAB75F39 --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:13⤵PID:4948
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=44FC482E2D5FD497162E37F187777575 --mojo-platform-channel-handle=1628 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:5084
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4EF32C9A36BB7B682EF278B1E808D089 --mojo-platform-channel-handle=2332 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1432
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1184ADB9D20713E6E9271E5BC5D7C44D --mojo-platform-channel-handle=1804 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1472
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=62EA2DD489991640FC84C22E9A639E8B --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=62EA2DD489991640FC84C22E9A639E8B --renderer-client-id=7 --mojo-platform-channel-handle=2648 --allow-no-sandbox-job /prefetch:13⤵PID:3660
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8CDE0E80D5986171D3A0CC70D8D52D02 --mojo-platform-channel-handle=2556 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2044
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD53fe9395aca4fd6bc0c64d90b61f2fff2
SHA1f59febf548d9baabd4c49ff50ead8f48a2050c39
SHA2569d9605dd74dc5dce5e14958b15f70f9741e8c8c452c66588e0cf8f32e843b6d6
SHA512b2714d8ef686d95b21afbec7c7b5b9f750c495bb222c96781dd373c8c80f9b564135738adaf910f9c9b183153dbec6353a1bdc01624b1b7500247ace1acc8e49