Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 08:30
Behavioral task
behavioral1
Sample
13781e30df847f2cd3adb8a51dc8b99d.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
13781e30df847f2cd3adb8a51dc8b99d.pdf
Resource
win10v2004-20231222-en
General
-
Target
13781e30df847f2cd3adb8a51dc8b99d.pdf
-
Size
86KB
-
MD5
13781e30df847f2cd3adb8a51dc8b99d
-
SHA1
f29653db92f8af470717ad6fcd92ea538bd0ffaf
-
SHA256
ddcc949667cf4d43609029cf18812497f0943c62dd431933823b45d5ca1e7a30
-
SHA512
c771b096ac5b835d3dd40b7ae6ebeda74767e80bff78d00e525d5d6adb2ad1870edb7a620734226211d5e33165534920679f02df6b30220f7b2c782ed5478afd
-
SSDEEP
1536:chktC1o91oANzsaFvH8L9Gi564EY88YkX+FWNgi1VAzs7BZWOpOaZwD20/57cREJ:/C1o91bfcLi4Elm1RDAzstSaZT0BAY
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4212 AcroRd32.exe 4212 AcroRd32.exe 4212 AcroRd32.exe 4212 AcroRd32.exe 4212 AcroRd32.exe 4212 AcroRd32.exe 4212 AcroRd32.exe 4212 AcroRd32.exe 4212 AcroRd32.exe 4212 AcroRd32.exe 4212 AcroRd32.exe 4212 AcroRd32.exe 4212 AcroRd32.exe 4212 AcroRd32.exe 4212 AcroRd32.exe 4212 AcroRd32.exe 4212 AcroRd32.exe 4212 AcroRd32.exe 4212 AcroRd32.exe 4212 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4212 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4212 AcroRd32.exe 4212 AcroRd32.exe 4212 AcroRd32.exe 4212 AcroRd32.exe 4212 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4212 wrote to memory of 3208 4212 AcroRd32.exe 91 PID 4212 wrote to memory of 3208 4212 AcroRd32.exe 91 PID 4212 wrote to memory of 3208 4212 AcroRd32.exe 91 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 2336 3208 RdrCEF.exe 93 PID 3208 wrote to memory of 4332 3208 RdrCEF.exe 92 PID 3208 wrote to memory of 4332 3208 RdrCEF.exe 92 PID 3208 wrote to memory of 4332 3208 RdrCEF.exe 92 PID 3208 wrote to memory of 4332 3208 RdrCEF.exe 92 PID 3208 wrote to memory of 4332 3208 RdrCEF.exe 92 PID 3208 wrote to memory of 4332 3208 RdrCEF.exe 92 PID 3208 wrote to memory of 4332 3208 RdrCEF.exe 92 PID 3208 wrote to memory of 4332 3208 RdrCEF.exe 92 PID 3208 wrote to memory of 4332 3208 RdrCEF.exe 92 PID 3208 wrote to memory of 4332 3208 RdrCEF.exe 92 PID 3208 wrote to memory of 4332 3208 RdrCEF.exe 92 PID 3208 wrote to memory of 4332 3208 RdrCEF.exe 92 PID 3208 wrote to memory of 4332 3208 RdrCEF.exe 92 PID 3208 wrote to memory of 4332 3208 RdrCEF.exe 92 PID 3208 wrote to memory of 4332 3208 RdrCEF.exe 92 PID 3208 wrote to memory of 4332 3208 RdrCEF.exe 92 PID 3208 wrote to memory of 4332 3208 RdrCEF.exe 92 PID 3208 wrote to memory of 4332 3208 RdrCEF.exe 92 PID 3208 wrote to memory of 4332 3208 RdrCEF.exe 92 PID 3208 wrote to memory of 4332 3208 RdrCEF.exe 92
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\13781e30df847f2cd3adb8a51dc8b99d.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=5C30189E13944AB87705636DE89563F9 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=5C30189E13944AB87705636DE89563F9 --renderer-client-id=2 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job /prefetch:13⤵PID:4332
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A64F62EB89352F00E7F28CC4D455C579 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2336
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3D9880077EF37042C559C40AE2AF42B8 --mojo-platform-channel-handle=2300 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4828
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=603AE3EE987C741887A71C4A6AA5435F --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=603AE3EE987C741887A71C4A6AA5435F --renderer-client-id=5 --mojo-platform-channel-handle=2432 --allow-no-sandbox-job /prefetch:13⤵PID:2880
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=80914C633211CA1A11FBF97693FD8A4B --mojo-platform-channel-handle=2664 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1684
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F539F065CB8B211A90222D303CA9BB99 --mojo-platform-channel-handle=2680 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3760
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD59720ef183fe3d0bb8151794436cae8f7
SHA1ebf519e69f68005654cc5db7c5b73a77f7ac3fe0
SHA25610f7f8a58f927a34435638cd4a29ba76808f3a6dd0c6f2dd6e33957a194f4b03
SHA5120c00fbad371b4509a42ef6d7917b05f45329838fe603c9b7fcb4ce448ff7a838f9ef239aa14fd51361fb723a2083744a98b89feaab7c8de11d6791337e936fd8