Analysis
-
max time kernel
168s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 12:56
Behavioral task
behavioral1
Sample
1933a15e5e6b1ad6f0f25c3be29e6bf0.pdf
Resource
win7-20231129-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1933a15e5e6b1ad6f0f25c3be29e6bf0.pdf
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
1933a15e5e6b1ad6f0f25c3be29e6bf0.pdf
-
Size
42KB
-
MD5
1933a15e5e6b1ad6f0f25c3be29e6bf0
-
SHA1
9167ff439dd7572a9225b28e1a02bd12829e1074
-
SHA256
d7434a635ef38658b13df0e610ebeae8370e404d73b2ba6e87bebf33be396b14
-
SHA512
9b82ebd7b27647bc97d845ebe14e4da7ecdbae150bccea1174d5f9465f6fe02e464ad03e56d35f882227de4ea80cc271d0bcbd494d30167136e1d9cf741a3401
-
SSDEEP
768:6t145PWZ9tseKEuxuKcqTQuPJJ3Kd/mMIv37G2HFPmrh/A31isRh:6tK5uRDl0c2QsPKdOMorHerh/NKh
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4628 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4628 AcroRd32.exe 4628 AcroRd32.exe 4628 AcroRd32.exe 4628 AcroRd32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4628 wrote to memory of 4972 4628 AcroRd32.exe 109 PID 4628 wrote to memory of 4972 4628 AcroRd32.exe 109 PID 4628 wrote to memory of 4972 4628 AcroRd32.exe 109 PID 4628 wrote to memory of 392 4628 AcroRd32.exe 110 PID 4628 wrote to memory of 392 4628 AcroRd32.exe 110 PID 4628 wrote to memory of 392 4628 AcroRd32.exe 110
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1933a15e5e6b1ad6f0f25c3be29e6bf0.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:4972
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:392
-