Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 07:01
Behavioral task
behavioral1
Sample
11a4c855bb1886b33ddae72be3a505ef.pdf
Resource
win7-20231215-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
11a4c855bb1886b33ddae72be3a505ef.pdf
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
11a4c855bb1886b33ddae72be3a505ef.pdf
-
Size
94KB
-
MD5
11a4c855bb1886b33ddae72be3a505ef
-
SHA1
a9224b70d546e620c68444b501a967a996f93339
-
SHA256
b2b9e3224f32e3f8c4ef9afaba1e819d45d63d6cab49d16165728a6e5bef3772
-
SHA512
f3724599f9ff752025f967784fd0b4090fe4b47265b63a4a87b8c03c96caa95cff97dc3428d8dbfca89f166d357ac06133901322c6de43bed179611eb7e6ab3f
-
SSDEEP
1536:CfLx7eZPH06dLef6mq8MLbqVWc9AhxyT7uzWQWGE53WOpOwrKWro1QsIH7VKUUs8:u7eZf0B6mq8MLGVWc9MwcE50wruQsI8N
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 820 AcroRd32.exe 820 AcroRd32.exe 820 AcroRd32.exe 820 AcroRd32.exe 820 AcroRd32.exe 820 AcroRd32.exe 820 AcroRd32.exe 820 AcroRd32.exe 820 AcroRd32.exe 820 AcroRd32.exe 820 AcroRd32.exe 820 AcroRd32.exe 820 AcroRd32.exe 820 AcroRd32.exe 820 AcroRd32.exe 820 AcroRd32.exe 820 AcroRd32.exe 820 AcroRd32.exe 820 AcroRd32.exe 820 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 820 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 820 AcroRd32.exe 820 AcroRd32.exe 820 AcroRd32.exe 820 AcroRd32.exe 820 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 820 wrote to memory of 1660 820 AcroRd32.exe 96 PID 820 wrote to memory of 1660 820 AcroRd32.exe 96 PID 820 wrote to memory of 1660 820 AcroRd32.exe 96 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 3752 1660 RdrCEF.exe 99 PID 1660 wrote to memory of 4604 1660 RdrCEF.exe 98 PID 1660 wrote to memory of 4604 1660 RdrCEF.exe 98 PID 1660 wrote to memory of 4604 1660 RdrCEF.exe 98 PID 1660 wrote to memory of 4604 1660 RdrCEF.exe 98 PID 1660 wrote to memory of 4604 1660 RdrCEF.exe 98 PID 1660 wrote to memory of 4604 1660 RdrCEF.exe 98 PID 1660 wrote to memory of 4604 1660 RdrCEF.exe 98 PID 1660 wrote to memory of 4604 1660 RdrCEF.exe 98 PID 1660 wrote to memory of 4604 1660 RdrCEF.exe 98 PID 1660 wrote to memory of 4604 1660 RdrCEF.exe 98 PID 1660 wrote to memory of 4604 1660 RdrCEF.exe 98 PID 1660 wrote to memory of 4604 1660 RdrCEF.exe 98 PID 1660 wrote to memory of 4604 1660 RdrCEF.exe 98 PID 1660 wrote to memory of 4604 1660 RdrCEF.exe 98 PID 1660 wrote to memory of 4604 1660 RdrCEF.exe 98 PID 1660 wrote to memory of 4604 1660 RdrCEF.exe 98 PID 1660 wrote to memory of 4604 1660 RdrCEF.exe 98 PID 1660 wrote to memory of 4604 1660 RdrCEF.exe 98 PID 1660 wrote to memory of 4604 1660 RdrCEF.exe 98 PID 1660 wrote to memory of 4604 1660 RdrCEF.exe 98
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\11a4c855bb1886b33ddae72be3a505ef.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=51DC238523825A264DBFB09FAC558137 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=51DC238523825A264DBFB09FAC558137 --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:13⤵PID:4604
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=38192BAAD03381E1D14C5E3DA27E61D5 --mojo-platform-channel-handle=1724 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3752
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=5F71BED9175D3BF9192D80230B32E207 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=5F71BED9175D3BF9192D80230B32E207 --renderer-client-id=4 --mojo-platform-channel-handle=2292 --allow-no-sandbox-job /prefetch:13⤵PID:2012
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=749FF8ECBBD339013DB5D9B04A2263A6 --mojo-platform-channel-handle=2416 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3940
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=06F7BC900C9436A4CC086EA1CD661E7C --mojo-platform-channel-handle=2676 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4524
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A4526E7805F00988A1E8CA8A84BAA394 --mojo-platform-channel-handle=1892 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4504
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3552