Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 12:18
Behavioral task
behavioral1
Sample
6de8b2dc5f89fab5cba3534abb3e1724.pdf
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
6de8b2dc5f89fab5cba3534abb3e1724.pdf
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
6de8b2dc5f89fab5cba3534abb3e1724.pdf
-
Size
82KB
-
MD5
6de8b2dc5f89fab5cba3534abb3e1724
-
SHA1
81ea299f3c313b032e1803b3167de5c5c39828a6
-
SHA256
9f4feb48e5d82b262bd4b653446a3d87506afe51b7e3d87261533e8d646988db
-
SHA512
bdb3b57fe93e376fc249c83f4626c209d8f047425f68dc5c76e50db3cc815984ac9ea299c98636fad9e9a9919341e2bca7c911f8fa87f03b30bc23d804b12596
-
SSDEEP
1536:x4P2bVUq8ep+bAPq6GkMNLs7bDkI4k9WkNpOPaWRqEEL550oM24iIviHQcfj:9b2epJPKkMN4HCPWRl50oM2dGUn
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2944 AcroRd32.exe 2944 AcroRd32.exe 2944 AcroRd32.exe 2944 AcroRd32.exe 2944 AcroRd32.exe 2944 AcroRd32.exe 2944 AcroRd32.exe 2944 AcroRd32.exe 2944 AcroRd32.exe 2944 AcroRd32.exe 2944 AcroRd32.exe 2944 AcroRd32.exe 2944 AcroRd32.exe 2944 AcroRd32.exe 2944 AcroRd32.exe 2944 AcroRd32.exe 2944 AcroRd32.exe 2944 AcroRd32.exe 2944 AcroRd32.exe 2944 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2944 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2944 AcroRd32.exe 2944 AcroRd32.exe 2944 AcroRd32.exe 2944 AcroRd32.exe 2944 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2944 wrote to memory of 484 2944 AcroRd32.exe 95 PID 2944 wrote to memory of 484 2944 AcroRd32.exe 95 PID 2944 wrote to memory of 484 2944 AcroRd32.exe 95 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 1240 484 RdrCEF.exe 99 PID 484 wrote to memory of 2072 484 RdrCEF.exe 98 PID 484 wrote to memory of 2072 484 RdrCEF.exe 98 PID 484 wrote to memory of 2072 484 RdrCEF.exe 98 PID 484 wrote to memory of 2072 484 RdrCEF.exe 98 PID 484 wrote to memory of 2072 484 RdrCEF.exe 98 PID 484 wrote to memory of 2072 484 RdrCEF.exe 98 PID 484 wrote to memory of 2072 484 RdrCEF.exe 98 PID 484 wrote to memory of 2072 484 RdrCEF.exe 98 PID 484 wrote to memory of 2072 484 RdrCEF.exe 98 PID 484 wrote to memory of 2072 484 RdrCEF.exe 98 PID 484 wrote to memory of 2072 484 RdrCEF.exe 98 PID 484 wrote to memory of 2072 484 RdrCEF.exe 98 PID 484 wrote to memory of 2072 484 RdrCEF.exe 98 PID 484 wrote to memory of 2072 484 RdrCEF.exe 98 PID 484 wrote to memory of 2072 484 RdrCEF.exe 98 PID 484 wrote to memory of 2072 484 RdrCEF.exe 98 PID 484 wrote to memory of 2072 484 RdrCEF.exe 98 PID 484 wrote to memory of 2072 484 RdrCEF.exe 98 PID 484 wrote to memory of 2072 484 RdrCEF.exe 98 PID 484 wrote to memory of 2072 484 RdrCEF.exe 98
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\6de8b2dc5f89fab5cba3534abb3e1724.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=471D71B0D8FBD1EB08EF106484D75B95 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=471D71B0D8FBD1EB08EF106484D75B95 --renderer-client-id=2 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job /prefetch:13⤵PID:2072
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=936E5E9328BB2988F7A171326F8B0FAF --mojo-platform-channel-handle=1752 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1240
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E0AB62CB922AE93EDF12C9366847FC81 --mojo-platform-channel-handle=2308 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2304
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=F0BCFF7EDBA678DC6A47E78D403D4498 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=F0BCFF7EDBA678DC6A47E78D403D4498 --renderer-client-id=5 --mojo-platform-channel-handle=1956 --allow-no-sandbox-job /prefetch:13⤵PID:3148
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=35958888A46D26E090224AC44908BEEA --mojo-platform-channel-handle=2584 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2752
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=68B3929EC7D52C004AF6C8D2317AE208 --mojo-platform-channel-handle=2792 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4856
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4324