Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 22:54
Behavioral task
behavioral1
Sample
fe2673416a63b33c504bc3cc335186bf.pdf
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fe2673416a63b33c504bc3cc335186bf.pdf
Resource
win10v2004-20231215-en
General
-
Target
fe2673416a63b33c504bc3cc335186bf.pdf
-
Size
9KB
-
MD5
fe2673416a63b33c504bc3cc335186bf
-
SHA1
2e85bb74c4eea30c87940b5f32a05f4471032f14
-
SHA256
09d37c9b88183a5472d9b3fb54ced187d94ee40e03742f7c5f2963507dd5ec88
-
SHA512
1f8c7e457e487f722ec9ab9c3152955b8824ded29400b37c5dba1e724030483ef701979c819ef9a78f749a18f70368e8ee58474707603b0956a2e688ea9ba9ce
-
SSDEEP
192:F3hzajYywAO9G+/vqvQNi/60un/T9pdl2Mdaog5k45CRAGjE:dhzazwAO9GiUQi/60G79/l2MFgTCmGY
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2800 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe 2800 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2800 wrote to memory of 3180 2800 AcroRd32.exe 92 PID 2800 wrote to memory of 3180 2800 AcroRd32.exe 92 PID 2800 wrote to memory of 3180 2800 AcroRd32.exe 92 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 456 3180 RdrCEF.exe 94 PID 3180 wrote to memory of 4924 3180 RdrCEF.exe 93 PID 3180 wrote to memory of 4924 3180 RdrCEF.exe 93 PID 3180 wrote to memory of 4924 3180 RdrCEF.exe 93 PID 3180 wrote to memory of 4924 3180 RdrCEF.exe 93 PID 3180 wrote to memory of 4924 3180 RdrCEF.exe 93 PID 3180 wrote to memory of 4924 3180 RdrCEF.exe 93 PID 3180 wrote to memory of 4924 3180 RdrCEF.exe 93 PID 3180 wrote to memory of 4924 3180 RdrCEF.exe 93 PID 3180 wrote to memory of 4924 3180 RdrCEF.exe 93 PID 3180 wrote to memory of 4924 3180 RdrCEF.exe 93 PID 3180 wrote to memory of 4924 3180 RdrCEF.exe 93 PID 3180 wrote to memory of 4924 3180 RdrCEF.exe 93 PID 3180 wrote to memory of 4924 3180 RdrCEF.exe 93 PID 3180 wrote to memory of 4924 3180 RdrCEF.exe 93 PID 3180 wrote to memory of 4924 3180 RdrCEF.exe 93 PID 3180 wrote to memory of 4924 3180 RdrCEF.exe 93 PID 3180 wrote to memory of 4924 3180 RdrCEF.exe 93 PID 3180 wrote to memory of 4924 3180 RdrCEF.exe 93 PID 3180 wrote to memory of 4924 3180 RdrCEF.exe 93 PID 3180 wrote to memory of 4924 3180 RdrCEF.exe 93
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\fe2673416a63b33c504bc3cc335186bf.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=3AB55169326356D1F480D0D527B778EA --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=3AB55169326356D1F480D0D527B778EA --renderer-client-id=2 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job /prefetch:13⤵PID:4924
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B3552558EB757D51D7AD192568E994DD --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:456
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7DF06BEA3EEB4C3F1725FA3C1991AB60 --mojo-platform-channel-handle=2284 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:448
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8D43DB023E475D27EE17844449832F31 --mojo-platform-channel-handle=1920 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4572
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=3475868BD181CD4BE93058AD7E70121B --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=3475868BD181CD4BE93058AD7E70121B --renderer-client-id=6 --mojo-platform-channel-handle=2384 --allow-no-sandbox-job /prefetch:13⤵PID:5056
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7DF59025CB3C5831E62FD91D2972DA3E --mojo-platform-channel-handle=2444 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1656
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5ee7f182a3e9e4becf1868e28af1fbd6a
SHA1fc0f3b1714cac3ad00f3c84a2b1292efccf7875f
SHA256b4398fbc1dc9e62dc71a76c332db657c290975bb18f77f59f50abbedb2db645f
SHA5125ffba2c8d399114a2b772b3d298e46576d5fa2094bba0fc09a57721ce2fe48ec51c32b7afff19ae306d8c407322d04bc9ed6b4cba9dc4b571a7421b38db6f15e
-
Filesize
56KB
MD5c26ed30e7d5ab440480838636efc41db
SHA1c66e0d00b56abebfb60d2fcc5cf85ad31a0d6591
SHA2566a3c5c4a8e57f77ecc22078fbf603ecc31fb82d429bd87b7b4b9261447092aef
SHA51296cdb78bca3e01d4513c31661987e5646e6a8ff24708918aa0d66dfa3ca5d98af4862c9f38c4f41f933c345d2d3adfb1d34d1430b33f45f916f41a9872a030df
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5