Analysis
-
max time kernel
156s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 23:33
Behavioral task
behavioral1
Sample
2022f6f929332dddb06742cf30bd2bd7.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2022f6f929332dddb06742cf30bd2bd7.pdf
Resource
win10v2004-20231215-en
General
-
Target
2022f6f929332dddb06742cf30bd2bd7.pdf
-
Size
33KB
-
MD5
2022f6f929332dddb06742cf30bd2bd7
-
SHA1
57865d48b82bfee440d59af307bb76f0932e481e
-
SHA256
1d68713512ed0c432475190d9a4a6530451cc624b65a2d1fec4c8be2adb82909
-
SHA512
63d6b4f48c54789b594bd563db1e0b68217b10a91cfaa91da73a32bc8286afe961b379d43616c23c7ade16cbf38993282b1242308a2a091290eb9e9e34cb678b
-
SSDEEP
768:d3Ul6/VVsDdEJrFxpCbkkiunOnKOxTikY:9+gkdETbCbiunIKIOkY
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2464 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe 2464 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2464 wrote to memory of 4428 2464 AcroRd32.exe 91 PID 2464 wrote to memory of 4428 2464 AcroRd32.exe 91 PID 2464 wrote to memory of 4428 2464 AcroRd32.exe 91 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1348 4428 RdrCEF.exe 92 PID 4428 wrote to memory of 1480 4428 RdrCEF.exe 93 PID 4428 wrote to memory of 1480 4428 RdrCEF.exe 93 PID 4428 wrote to memory of 1480 4428 RdrCEF.exe 93 PID 4428 wrote to memory of 1480 4428 RdrCEF.exe 93 PID 4428 wrote to memory of 1480 4428 RdrCEF.exe 93 PID 4428 wrote to memory of 1480 4428 RdrCEF.exe 93 PID 4428 wrote to memory of 1480 4428 RdrCEF.exe 93 PID 4428 wrote to memory of 1480 4428 RdrCEF.exe 93 PID 4428 wrote to memory of 1480 4428 RdrCEF.exe 93 PID 4428 wrote to memory of 1480 4428 RdrCEF.exe 93 PID 4428 wrote to memory of 1480 4428 RdrCEF.exe 93 PID 4428 wrote to memory of 1480 4428 RdrCEF.exe 93 PID 4428 wrote to memory of 1480 4428 RdrCEF.exe 93 PID 4428 wrote to memory of 1480 4428 RdrCEF.exe 93 PID 4428 wrote to memory of 1480 4428 RdrCEF.exe 93 PID 4428 wrote to memory of 1480 4428 RdrCEF.exe 93 PID 4428 wrote to memory of 1480 4428 RdrCEF.exe 93 PID 4428 wrote to memory of 1480 4428 RdrCEF.exe 93
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2022f6f929332dddb06742cf30bd2bd7.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=3FD6FC64C9653A510420FA6F7F587E0A --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=3FD6FC64C9653A510420FA6F7F587E0A --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:13⤵PID:1348
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=93FE47C5C3472EAFA70B97810D7B7C1C --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1480
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=0A31C023CF94E546080CAA2105D17853 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=0A31C023CF94E546080CAA2105D17853 --renderer-client-id=4 --mojo-platform-channel-handle=2304 --allow-no-sandbox-job /prefetch:13⤵PID:4324
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D2F37E0A0ECA6951FFBE992381ACF57A --mojo-platform-channel-handle=2328 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3844
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D6B94488F1AABE1B2137F6F240B593E1 --mojo-platform-channel-handle=2584 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3428
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E541ADF474F671B94D6CCF7036EC5CC2 --mojo-platform-channel-handle=2500 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2512
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD56b0942ed789144e12560788f9216aa03
SHA18cfccca6b1084863f55d4b5c3b606657ed74e8cc
SHA256acc2971eccf4ac350fb00c4eca8c732f4a4a2824a1bde62cb1b479cc24155d69
SHA51255d769d31ec062083e62089adaa07032e13a31d57163ddce69d8398690d4b4bdb52bd814dd704d42ddb9b1c23f2045c3b99e1e39c0f1d14f6d389389bda1eaea