Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 10:30
Behavioral task
behavioral1
Sample
15f5fef09e1dd262d090d77b5bd4e74a.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
15f5fef09e1dd262d090d77b5bd4e74a.pdf
Resource
win10v2004-20231215-en
General
-
Target
15f5fef09e1dd262d090d77b5bd4e74a.pdf
-
Size
96KB
-
MD5
15f5fef09e1dd262d090d77b5bd4e74a
-
SHA1
cf824d0833c56f109e3c2b3dd44ec604508d4ff7
-
SHA256
2a3a36e0c32013054064701c03809348b422d93bfbd3abc0eea3e1105dec48cb
-
SHA512
9883a46afd156e60504c1cceb7d5a0b030050e6c8d618042a55d16cf6687ca59993fda584e0ed9d574bc2f5cce38d9e59e5220d8db5c1eab581fe88fd34a63c8
-
SSDEEP
1536:vQGFszsdy2qPOA2jP9cBDRGCyz8CSXqiE2P5aM9h61DcWcBGn3tyW6pOu2lWVZlm:3SsdnLxWRGCy2qo5ax18odfu2NWA
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 464 AcroRd32.exe 464 AcroRd32.exe 464 AcroRd32.exe 464 AcroRd32.exe 464 AcroRd32.exe 464 AcroRd32.exe 464 AcroRd32.exe 464 AcroRd32.exe 464 AcroRd32.exe 464 AcroRd32.exe 464 AcroRd32.exe 464 AcroRd32.exe 464 AcroRd32.exe 464 AcroRd32.exe 464 AcroRd32.exe 464 AcroRd32.exe 464 AcroRd32.exe 464 AcroRd32.exe 464 AcroRd32.exe 464 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 464 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 464 AcroRd32.exe 464 AcroRd32.exe 464 AcroRd32.exe 464 AcroRd32.exe 464 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 464 wrote to memory of 4788 464 AcroRd32.exe 92 PID 464 wrote to memory of 4788 464 AcroRd32.exe 92 PID 464 wrote to memory of 4788 464 AcroRd32.exe 92 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 1836 4788 RdrCEF.exe 95 PID 4788 wrote to memory of 3832 4788 RdrCEF.exe 96 PID 4788 wrote to memory of 3832 4788 RdrCEF.exe 96 PID 4788 wrote to memory of 3832 4788 RdrCEF.exe 96 PID 4788 wrote to memory of 3832 4788 RdrCEF.exe 96 PID 4788 wrote to memory of 3832 4788 RdrCEF.exe 96 PID 4788 wrote to memory of 3832 4788 RdrCEF.exe 96 PID 4788 wrote to memory of 3832 4788 RdrCEF.exe 96 PID 4788 wrote to memory of 3832 4788 RdrCEF.exe 96 PID 4788 wrote to memory of 3832 4788 RdrCEF.exe 96 PID 4788 wrote to memory of 3832 4788 RdrCEF.exe 96 PID 4788 wrote to memory of 3832 4788 RdrCEF.exe 96 PID 4788 wrote to memory of 3832 4788 RdrCEF.exe 96 PID 4788 wrote to memory of 3832 4788 RdrCEF.exe 96 PID 4788 wrote to memory of 3832 4788 RdrCEF.exe 96 PID 4788 wrote to memory of 3832 4788 RdrCEF.exe 96 PID 4788 wrote to memory of 3832 4788 RdrCEF.exe 96 PID 4788 wrote to memory of 3832 4788 RdrCEF.exe 96 PID 4788 wrote to memory of 3832 4788 RdrCEF.exe 96 PID 4788 wrote to memory of 3832 4788 RdrCEF.exe 96 PID 4788 wrote to memory of 3832 4788 RdrCEF.exe 96
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\15f5fef09e1dd262d090d77b5bd4e74a.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3EB749A6A56B29BF69732B17705E9C03 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1836
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=F1A6BC30D2C779B35E6D1131A38C88DF --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=F1A6BC30D2C779B35E6D1131A38C88DF --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:13⤵PID:3832
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=B398646523B086D48D4E1BE1B5C25692 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=B398646523B086D48D4E1BE1B5C25692 --renderer-client-id=4 --mojo-platform-channel-handle=2188 --allow-no-sandbox-job /prefetch:13⤵PID:1276
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F111B833BEB0D7178B15D78F7D3D71DF --mojo-platform-channel-handle=2552 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3888
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6EF1F86C583F5FC3577025C799BA9B60 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4496
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=84CF02C75D26352C7CF17C69560E0D5C --mojo-platform-channel-handle=2568 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5aaecfe5c50d834a71e1a3f2215acac59
SHA11ab48b12408664e2c0539f76cf633f868195d420
SHA256a3cee3c6c8fddb8f4a4da3ab4d17e4a546e78f421902efa11115865351e84188
SHA5124786cca16e4b4bdd2aef0cdf8b5fb2137f4f547c1b115a7e8469906b7ff4110cdbc935650c4df8e89f60a5dc96adfe245603bcf1b56df4df6bd242ccac877ce8
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5