Analysis
-
max time kernel
213s -
max time network
226s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 07:07
Behavioral task
behavioral1
Sample
11c1ed71d9f98fd7784e212f7d777737.pdf
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
11c1ed71d9f98fd7784e212f7d777737.pdf
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
11c1ed71d9f98fd7784e212f7d777737.pdf
-
Size
75KB
-
MD5
11c1ed71d9f98fd7784e212f7d777737
-
SHA1
99310c6bc21e9ac653399bf46aef6c3424deb6d2
-
SHA256
1020a6e550db2e563b82fc7405e82b3a8f18e708d426dff8a9fdc548eccea8f5
-
SHA512
9d1956e03c97427de3f91abfcb996cdccc16ac843b5ade0030238a5a6505fa74311135ea2b7c30079f9045bef092a2bdd2633ac47b54ed6fcca831df3ec0124a
-
SSDEEP
1536:CLG8radhMENCHaTDt26UPOaFzZSVNIHY+a/M7myQEAM1v9u6i:SrUhxC6XttT2YP/CQ5MLo
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1444 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe 1444 AcroRd32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2040 1444 AcroRd32.exe 100 PID 1444 wrote to memory of 2040 1444 AcroRd32.exe 100 PID 1444 wrote to memory of 2040 1444 AcroRd32.exe 100 PID 1444 wrote to memory of 4756 1444 AcroRd32.exe 102 PID 1444 wrote to memory of 4756 1444 AcroRd32.exe 102 PID 1444 wrote to memory of 4756 1444 AcroRd32.exe 102
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\11c1ed71d9f98fd7784e212f7d777737.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:2040
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:4756
-