Analysis
-
max time kernel
160s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 07:53
Behavioral task
behavioral1
Sample
12adbdaf42d0d1221df4db8c62fa8687.pdf
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
12adbdaf42d0d1221df4db8c62fa8687.pdf
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
12adbdaf42d0d1221df4db8c62fa8687.pdf
-
Size
45KB
-
MD5
12adbdaf42d0d1221df4db8c62fa8687
-
SHA1
51f7da6865fa09a50d37cb818ab6c0501b82fc37
-
SHA256
ac85b2ab5dbca7458af79a3d98d97ca4eb4880b23a0535d52d6a902d450edd58
-
SHA512
4117d6d4d5905cbd8590545a3f4895a1b38504f637d0c8ff7066ff79f54050672c69c5a297c9ecf49db7c4c7ffcc57ca6ee6b7591f9d3333f5812b682d145449
-
SSDEEP
768:gy2uWAcDP5ByKdJhER5YECu9v2/adggOPZWuRx7jGPE2KCJepg:gyfePTPETYEl4myPZWuRx7mBgg
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4708 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4708 AcroRd32.exe 4708 AcroRd32.exe 4708 AcroRd32.exe 4708 AcroRd32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4708 wrote to memory of 2340 4708 AcroRd32.exe 108 PID 4708 wrote to memory of 2340 4708 AcroRd32.exe 108 PID 4708 wrote to memory of 2340 4708 AcroRd32.exe 108
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\12adbdaf42d0d1221df4db8c62fa8687.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:2340
-