Analysis
-
max time kernel
163s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 20:12
Behavioral task
behavioral1
Sample
02afacc6363c52d6d30b64b54d83f213.pdf
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
02afacc6363c52d6d30b64b54d83f213.pdf
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
02afacc6363c52d6d30b64b54d83f213.pdf
-
Size
85KB
-
MD5
02afacc6363c52d6d30b64b54d83f213
-
SHA1
1e61d315b85bd85f576cac26c6f0ab0826f72487
-
SHA256
7e18b085aaff24f99a7ee489b1083767703da1c76c2b017036cfc7090b10d249
-
SHA512
1b35ce7e1f3e749c5a1bcd0f2f80a76c7ab9b79434278158aba2409887e434b1bdcae04096ba3d97f5c9d8533f93185a26bdfa65191157aa8299d7900c8621cf
-
SSDEEP
1536:/Th2S3XkREqh6yVEKA4RKHE5lMZh2Wx8oDfzb7oWx7qutpeFW8pO+Kbe:7Ln5KfdlEAu8mbb7h7qq4U+f
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4292 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4292 AcroRd32.exe 4292 AcroRd32.exe 4292 AcroRd32.exe 4292 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\02afacc6363c52d6d30b64b54d83f213.pdf"1⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4292