Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 20:16
Behavioral task
behavioral1
Sample
1ba6e178b3ae237c0d070b78b1343a4f.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1ba6e178b3ae237c0d070b78b1343a4f.pdf
Resource
win10v2004-20231215-en
General
-
Target
1ba6e178b3ae237c0d070b78b1343a4f.pdf
-
Size
85KB
-
MD5
1ba6e178b3ae237c0d070b78b1343a4f
-
SHA1
7d2eae48008155f90368529068428fa24a2a5183
-
SHA256
7e0f68d66cd9882484f34df4a84eb8cf20b111de6d912319da72b7a61b4aa930
-
SHA512
137b7e3ece2f9b3a73fb705c8f999105821441bc128ebe77c82a108115c9275b6407e64669950497a97d87ee991d5af609aa03accb6f40c1e1edde39665e4389
-
SSDEEP
1536:PtTO9YDqCLrKwRMxtwQcIrVSzWVbfwBPkLdL6WkxKSE8WGpOKHdB+VWVErQMUwbW:MyFqsNQcIr0iVbYoUWkxGhKHL+Tx1W
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1352 AcroRd32.exe 1352 AcroRd32.exe 1352 AcroRd32.exe 1352 AcroRd32.exe 1352 AcroRd32.exe 1352 AcroRd32.exe 1352 AcroRd32.exe 1352 AcroRd32.exe 1352 AcroRd32.exe 1352 AcroRd32.exe 1352 AcroRd32.exe 1352 AcroRd32.exe 1352 AcroRd32.exe 1352 AcroRd32.exe 1352 AcroRd32.exe 1352 AcroRd32.exe 1352 AcroRd32.exe 1352 AcroRd32.exe 1352 AcroRd32.exe 1352 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1352 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1352 AcroRd32.exe 1352 AcroRd32.exe 1352 AcroRd32.exe 1352 AcroRd32.exe 1352 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1352 wrote to memory of 3272 1352 AcroRd32.exe 94 PID 1352 wrote to memory of 3272 1352 AcroRd32.exe 94 PID 1352 wrote to memory of 3272 1352 AcroRd32.exe 94 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 4360 3272 RdrCEF.exe 98 PID 3272 wrote to memory of 3488 3272 RdrCEF.exe 97 PID 3272 wrote to memory of 3488 3272 RdrCEF.exe 97 PID 3272 wrote to memory of 3488 3272 RdrCEF.exe 97 PID 3272 wrote to memory of 3488 3272 RdrCEF.exe 97 PID 3272 wrote to memory of 3488 3272 RdrCEF.exe 97 PID 3272 wrote to memory of 3488 3272 RdrCEF.exe 97 PID 3272 wrote to memory of 3488 3272 RdrCEF.exe 97 PID 3272 wrote to memory of 3488 3272 RdrCEF.exe 97 PID 3272 wrote to memory of 3488 3272 RdrCEF.exe 97 PID 3272 wrote to memory of 3488 3272 RdrCEF.exe 97 PID 3272 wrote to memory of 3488 3272 RdrCEF.exe 97 PID 3272 wrote to memory of 3488 3272 RdrCEF.exe 97 PID 3272 wrote to memory of 3488 3272 RdrCEF.exe 97 PID 3272 wrote to memory of 3488 3272 RdrCEF.exe 97 PID 3272 wrote to memory of 3488 3272 RdrCEF.exe 97 PID 3272 wrote to memory of 3488 3272 RdrCEF.exe 97 PID 3272 wrote to memory of 3488 3272 RdrCEF.exe 97 PID 3272 wrote to memory of 3488 3272 RdrCEF.exe 97 PID 3272 wrote to memory of 3488 3272 RdrCEF.exe 97 PID 3272 wrote to memory of 3488 3272 RdrCEF.exe 97
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1ba6e178b3ae237c0d070b78b1343a4f.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=571AFAEF617A008B5B99A2F0996A5478 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=571AFAEF617A008B5B99A2F0996A5478 --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:13⤵PID:3488
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=209335C6D006A5E63419A45D7C89FE77 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4360
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=282C5FBA03AC73E8A0666150DEBE12B3 --mojo-platform-channel-handle=2288 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2492
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1F257CB293BE4893471F92B13069721C --mojo-platform-channel-handle=1804 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2736
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=B6AC03E7AC065D73A481C3422259FF01 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=B6AC03E7AC065D73A481C3422259FF01 --renderer-client-id=7 --mojo-platform-channel-handle=2288 --allow-no-sandbox-job /prefetch:13⤵PID:1828
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1EA750DC68CBFF15EF5903496FC32BA5 --mojo-platform-channel-handle=2560 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2620
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD57e7076bf437e5b40d7e800983cc7cbb5
SHA14db339d94713659aba5d4a6793290f4e0d52f491
SHA2561805c7ee063a65e6587c07bdd2724ee4f959635dd69abe21379ad46fa5605bfc
SHA5120c68c0a55f62d04081d7e33ea6d706275073619ff052a432e3beaa214ab247dd0199f3f7404b111ea7866bf152c6177b1f817f109ac4ac884c9ab8c80dbdf687