Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 20:04
Behavioral task
behavioral1
Sample
0288390ac5ea6e066e4d5299a16cfea6.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0288390ac5ea6e066e4d5299a16cfea6.pdf
Resource
win10v2004-20231215-en
General
-
Target
0288390ac5ea6e066e4d5299a16cfea6.pdf
-
Size
113KB
-
MD5
0288390ac5ea6e066e4d5299a16cfea6
-
SHA1
9f9a489ba518693d4b9007e2f3a90529c92eb4cc
-
SHA256
41bbf7ba28171a964f0604655a30ee221330d5184166e67b6da0fc38f1202096
-
SHA512
8665308b73ae2d937b90a3b2c6e38b8001da0835809ea143a17791cdaf1a815009669fc86b059fb94c015d4d1e41129de9f2e3ea65fb96b1592be6fe74fa97f0
-
SSDEEP
3072:SDPCTy1ugBErX/dtHA+bJ9SYaPPi3nLhY+T8Atv:APcyzBmVt3WYqyZ1
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2080 AcroRd32.exe 2080 AcroRd32.exe 2080 AcroRd32.exe 2080 AcroRd32.exe 2080 AcroRd32.exe 2080 AcroRd32.exe 2080 AcroRd32.exe 2080 AcroRd32.exe 2080 AcroRd32.exe 2080 AcroRd32.exe 2080 AcroRd32.exe 2080 AcroRd32.exe 2080 AcroRd32.exe 2080 AcroRd32.exe 2080 AcroRd32.exe 2080 AcroRd32.exe 2080 AcroRd32.exe 2080 AcroRd32.exe 2080 AcroRd32.exe 2080 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2080 AcroRd32.exe 2080 AcroRd32.exe 2080 AcroRd32.exe 2080 AcroRd32.exe 2080 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2080 wrote to memory of 4920 2080 AcroRd32.exe 92 PID 2080 wrote to memory of 4920 2080 AcroRd32.exe 92 PID 2080 wrote to memory of 4920 2080 AcroRd32.exe 92 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 4316 4920 RdrCEF.exe 96 PID 4920 wrote to memory of 1044 4920 RdrCEF.exe 95 PID 4920 wrote to memory of 1044 4920 RdrCEF.exe 95 PID 4920 wrote to memory of 1044 4920 RdrCEF.exe 95 PID 4920 wrote to memory of 1044 4920 RdrCEF.exe 95 PID 4920 wrote to memory of 1044 4920 RdrCEF.exe 95 PID 4920 wrote to memory of 1044 4920 RdrCEF.exe 95 PID 4920 wrote to memory of 1044 4920 RdrCEF.exe 95 PID 4920 wrote to memory of 1044 4920 RdrCEF.exe 95 PID 4920 wrote to memory of 1044 4920 RdrCEF.exe 95 PID 4920 wrote to memory of 1044 4920 RdrCEF.exe 95 PID 4920 wrote to memory of 1044 4920 RdrCEF.exe 95 PID 4920 wrote to memory of 1044 4920 RdrCEF.exe 95 PID 4920 wrote to memory of 1044 4920 RdrCEF.exe 95 PID 4920 wrote to memory of 1044 4920 RdrCEF.exe 95 PID 4920 wrote to memory of 1044 4920 RdrCEF.exe 95 PID 4920 wrote to memory of 1044 4920 RdrCEF.exe 95 PID 4920 wrote to memory of 1044 4920 RdrCEF.exe 95 PID 4920 wrote to memory of 1044 4920 RdrCEF.exe 95 PID 4920 wrote to memory of 1044 4920 RdrCEF.exe 95 PID 4920 wrote to memory of 1044 4920 RdrCEF.exe 95
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0288390ac5ea6e066e4d5299a16cfea6.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=F44FD2F9FFA5A6D4D2133188A6221844 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=F44FD2F9FFA5A6D4D2133188A6221844 --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:13⤵PID:1044
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=03CB57F4F64A9B3ED1F3DDB2EE6C4FD3 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4316
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6E65B26F0F6356B2741C99E9FF08FCAC --mojo-platform-channel-handle=2280 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2912
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=10F56AA7D9893FAA6F118124CFB2C6C7 --mojo-platform-channel-handle=1908 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1324
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=70C75A8C19F59EA395AD055D6EA6A4EB --mojo-platform-channel-handle=2284 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1156
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=D56DA0898406C98B91C53915EA777500 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=D56DA0898406C98B91C53915EA777500 --renderer-client-id=8 --mojo-platform-channel-handle=2372 --allow-no-sandbox-job /prefetch:13⤵PID:3316
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5ea9f223318c84f935529d06990d1b3f1
SHA146039bd5fa6593c2016b355d9303b5b9e6d63326
SHA256f1c68e0f31fedac6731156fdef7b10161d499f0ebf0dbbeaa5c856ac62cc9138
SHA512592eda04afece2a38c91318faafb9e4706a7e915fb98a7a2fc77f39691c918dee7baa05ee545ea57d0952ed1015ffa9b3af3c1d90ce8ce20129efb644b4c6768
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
1KB
MD5d0df5f9974138501424cb06472477adf
SHA19d143e2c9c48327c6fa0b4f2fb65be982037db51
SHA2566c3615c908cb98afc062e70b7f985bf7b667fd8540a25824aa07a14b6b6a05d6
SHA5129a7d8b47a8311e00ba206fee9bf0d42991a0caaf43492ea067bb6c9eb333a3231a35bae1efcd95add82d6dbfcfef5e10d42c084b9e73c5fdd7eadf8131324617