Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 02:54
Behavioral task
behavioral1
Sample
0c40e8e2636d54ad0c598d595871f0e6.pdf
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
0c40e8e2636d54ad0c598d595871f0e6.pdf
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
0c40e8e2636d54ad0c598d595871f0e6.pdf
-
Size
13KB
-
MD5
0c40e8e2636d54ad0c598d595871f0e6
-
SHA1
602da9e31d09c159ac21457a4c8089f912631b6f
-
SHA256
47ac785b984960ba07c1981bd58ce30fb8ccf9f1cf3357c7936ae0ee50b4f009
-
SHA512
2e7fca9af178d4b633e1ca457ff7035fb80414a8ccf1fd0b618c60ffc7f93ea2c3f834b98ed94253db696af6569ea062c4a238ce7fc5ad5c3391db256339d929
-
SSDEEP
384:6hzaNwAO9GiJlDmlAloSAhmbZ9/lQi/60G7J8vKIs:ahZGirHAhmbZ9tQC6dJiKH
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1268 AcroRd32.exe 1268 AcroRd32.exe 1268 AcroRd32.exe 1268 AcroRd32.exe 1268 AcroRd32.exe 1268 AcroRd32.exe 1268 AcroRd32.exe 1268 AcroRd32.exe 1268 AcroRd32.exe 1268 AcroRd32.exe 1268 AcroRd32.exe 1268 AcroRd32.exe 1268 AcroRd32.exe 1268 AcroRd32.exe 1268 AcroRd32.exe 1268 AcroRd32.exe 1268 AcroRd32.exe 1268 AcroRd32.exe 1268 AcroRd32.exe 1268 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1268 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1268 AcroRd32.exe 1268 AcroRd32.exe 1268 AcroRd32.exe 1268 AcroRd32.exe 1268 AcroRd32.exe 1268 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1268 wrote to memory of 3804 1268 AcroRd32.exe 91 PID 1268 wrote to memory of 3804 1268 AcroRd32.exe 91 PID 1268 wrote to memory of 3804 1268 AcroRd32.exe 91 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 2464 3804 RdrCEF.exe 92 PID 3804 wrote to memory of 3084 3804 RdrCEF.exe 93 PID 3804 wrote to memory of 3084 3804 RdrCEF.exe 93 PID 3804 wrote to memory of 3084 3804 RdrCEF.exe 93 PID 3804 wrote to memory of 3084 3804 RdrCEF.exe 93 PID 3804 wrote to memory of 3084 3804 RdrCEF.exe 93 PID 3804 wrote to memory of 3084 3804 RdrCEF.exe 93 PID 3804 wrote to memory of 3084 3804 RdrCEF.exe 93 PID 3804 wrote to memory of 3084 3804 RdrCEF.exe 93 PID 3804 wrote to memory of 3084 3804 RdrCEF.exe 93 PID 3804 wrote to memory of 3084 3804 RdrCEF.exe 93 PID 3804 wrote to memory of 3084 3804 RdrCEF.exe 93 PID 3804 wrote to memory of 3084 3804 RdrCEF.exe 93 PID 3804 wrote to memory of 3084 3804 RdrCEF.exe 93 PID 3804 wrote to memory of 3084 3804 RdrCEF.exe 93 PID 3804 wrote to memory of 3084 3804 RdrCEF.exe 93 PID 3804 wrote to memory of 3084 3804 RdrCEF.exe 93 PID 3804 wrote to memory of 3084 3804 RdrCEF.exe 93 PID 3804 wrote to memory of 3084 3804 RdrCEF.exe 93 PID 3804 wrote to memory of 3084 3804 RdrCEF.exe 93 PID 3804 wrote to memory of 3084 3804 RdrCEF.exe 93
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\0c40e8e2636d54ad0c598d595871f0e6.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=537B03BBD7AA3E022503551589EC5E9B --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2464
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=02BFE40DAF6B5CEE6848F519A46A8A11 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=02BFE40DAF6B5CEE6848F519A46A8A11 --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:13⤵PID:3084
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=69A72CAAA0D76D36F427C7A3ECB05B4D --mojo-platform-channel-handle=2188 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4396
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=521A8037D349F1F149D7FC059E000916 --mojo-platform-channel-handle=2432 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4080
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=59B8B275C9B6FC104F95D525355D01A5 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=59B8B275C9B6FC104F95D525355D01A5 --renderer-client-id=6 --mojo-platform-channel-handle=2192 --allow-no-sandbox-job /prefetch:13⤵PID:1204
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FE5CDC9C5C8B72EDB9D4F977B8B588FB --mojo-platform-channel-handle=2672 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:116
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4612