Analysis
-
max time kernel
143s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 23:38
Behavioral task
behavioral1
Sample
20489f6518977440789e8ef1c45b6541.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20489f6518977440789e8ef1c45b6541.pdf
Resource
win10v2004-20231215-en
General
-
Target
20489f6518977440789e8ef1c45b6541.pdf
-
Size
87KB
-
MD5
20489f6518977440789e8ef1c45b6541
-
SHA1
2168073d4f0d2696cea9e9ae68731911f469d5e3
-
SHA256
747b16d19a89e3c5ada3b5d51799d62a3962268047d1fe05d91f24ab925ba376
-
SHA512
9995f1e6af885872b4f226cef689a30485e53f69f42222f63043fc4eedc56b754c8ef6a63ca8dba510ea523b7b69ad342243a0653f42a25539ae3ba0aaf79d3b
-
SSDEEP
1536:VrLpx+kSMVbysX7ykXbkH4LthW0TJxS78Ip/VNXo+jxWx956d1dGQwK8W8pO+Snc:rAkFVbyU2H4LthW0TTSPp9N4+jWud1dw
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4172 AcroRd32.exe 4172 AcroRd32.exe 4172 AcroRd32.exe 4172 AcroRd32.exe 4172 AcroRd32.exe 4172 AcroRd32.exe 4172 AcroRd32.exe 4172 AcroRd32.exe 4172 AcroRd32.exe 4172 AcroRd32.exe 4172 AcroRd32.exe 4172 AcroRd32.exe 4172 AcroRd32.exe 4172 AcroRd32.exe 4172 AcroRd32.exe 4172 AcroRd32.exe 4172 AcroRd32.exe 4172 AcroRd32.exe 4172 AcroRd32.exe 4172 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4172 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4172 AcroRd32.exe 4172 AcroRd32.exe 4172 AcroRd32.exe 4172 AcroRd32.exe 4172 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4172 wrote to memory of 1492 4172 AcroRd32.exe 93 PID 4172 wrote to memory of 1492 4172 AcroRd32.exe 93 PID 4172 wrote to memory of 1492 4172 AcroRd32.exe 93 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2880 1492 RdrCEF.exe 94 PID 1492 wrote to memory of 2668 1492 RdrCEF.exe 95 PID 1492 wrote to memory of 2668 1492 RdrCEF.exe 95 PID 1492 wrote to memory of 2668 1492 RdrCEF.exe 95 PID 1492 wrote to memory of 2668 1492 RdrCEF.exe 95 PID 1492 wrote to memory of 2668 1492 RdrCEF.exe 95 PID 1492 wrote to memory of 2668 1492 RdrCEF.exe 95 PID 1492 wrote to memory of 2668 1492 RdrCEF.exe 95 PID 1492 wrote to memory of 2668 1492 RdrCEF.exe 95 PID 1492 wrote to memory of 2668 1492 RdrCEF.exe 95 PID 1492 wrote to memory of 2668 1492 RdrCEF.exe 95 PID 1492 wrote to memory of 2668 1492 RdrCEF.exe 95 PID 1492 wrote to memory of 2668 1492 RdrCEF.exe 95 PID 1492 wrote to memory of 2668 1492 RdrCEF.exe 95 PID 1492 wrote to memory of 2668 1492 RdrCEF.exe 95 PID 1492 wrote to memory of 2668 1492 RdrCEF.exe 95 PID 1492 wrote to memory of 2668 1492 RdrCEF.exe 95 PID 1492 wrote to memory of 2668 1492 RdrCEF.exe 95 PID 1492 wrote to memory of 2668 1492 RdrCEF.exe 95 PID 1492 wrote to memory of 2668 1492 RdrCEF.exe 95 PID 1492 wrote to memory of 2668 1492 RdrCEF.exe 95
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\20489f6518977440789e8ef1c45b6541.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6F511A4608738FFE5DA49EC18C2BCEA9 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2880
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=79A848A1642D3ED56656E8A620AC634D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=79A848A1642D3ED56656E8A620AC634D --renderer-client-id=2 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job /prefetch:13⤵PID:2668
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=100D4E1B975D92B02BC2D9E9389C692C --mojo-platform-channel-handle=1844 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4312
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8C591C71EE143D97BF9DE45CC6ED9A64 --mojo-platform-channel-handle=2356 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:836
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=CAB66CE40ECCCD22608F605DACA3E11B --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=CAB66CE40ECCCD22608F605DACA3E11B --renderer-client-id=5 --mojo-platform-channel-handle=2012 --allow-no-sandbox-job /prefetch:13⤵PID:1496
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1FB71F161E8623C58C54166FF610AFDA --mojo-platform-channel-handle=1936 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4328
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD55636a0bf54b7648e62a94fe256fd6bcd
SHA15f457a84f35bff25e0a01ab2f6211c1eb5956af2
SHA25615e216290fbc97fd2b5881a258e621f62a8a9890daf0de1a52054d8eb1a5eb12
SHA5125cde7b69e6410391d15261d464fda99c913fef550f640e6ec1d08bfabecd0722ea0cba2ce4421fa13c48d02a92b295accc9668e82a79deeca52be46222be20fd