Analysis
-
max time kernel
173s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 20:48
Behavioral task
behavioral1
Sample
1c29050eb34eb6d4a910695658b1c130.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1c29050eb34eb6d4a910695658b1c130.pdf
Resource
win10v2004-20231215-en
General
-
Target
1c29050eb34eb6d4a910695658b1c130.pdf
-
Size
6KB
-
MD5
1c29050eb34eb6d4a910695658b1c130
-
SHA1
d1ee5d9ccf93d1afeeef29ab940110bcd5144d36
-
SHA256
3bba8e0acca28dd40de8c951b34adc42fd950e83c54bcd121f9167386ec23d61
-
SHA512
f3ce634b19c6cc47d7b82cf380ab3e9675c6c84c4c9c99980c9e5d91b29b1f678e9ca0e50a4db11e613c9bbca3ffc48945388b6dff0fd21e79ec81022dfc4665
-
SSDEEP
192:M2RHQAXMtVaVriMQKfSdsAOSxbEyTtC6hSy1H:TQOMzaVjSdsAnxbEetCUSUH
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 728 AcroRd32.exe 728 AcroRd32.exe 728 AcroRd32.exe 728 AcroRd32.exe 728 AcroRd32.exe 728 AcroRd32.exe 728 AcroRd32.exe 728 AcroRd32.exe 728 AcroRd32.exe 728 AcroRd32.exe 728 AcroRd32.exe 728 AcroRd32.exe 728 AcroRd32.exe 728 AcroRd32.exe 728 AcroRd32.exe 728 AcroRd32.exe 728 AcroRd32.exe 728 AcroRd32.exe 728 AcroRd32.exe 728 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 728 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 728 AcroRd32.exe 728 AcroRd32.exe 728 AcroRd32.exe 728 AcroRd32.exe 728 AcroRd32.exe 728 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 728 wrote to memory of 3372 728 AcroRd32.exe 93 PID 728 wrote to memory of 3372 728 AcroRd32.exe 93 PID 728 wrote to memory of 3372 728 AcroRd32.exe 93 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4220 3372 RdrCEF.exe 96 PID 3372 wrote to memory of 4716 3372 RdrCEF.exe 97 PID 3372 wrote to memory of 4716 3372 RdrCEF.exe 97 PID 3372 wrote to memory of 4716 3372 RdrCEF.exe 97 PID 3372 wrote to memory of 4716 3372 RdrCEF.exe 97 PID 3372 wrote to memory of 4716 3372 RdrCEF.exe 97 PID 3372 wrote to memory of 4716 3372 RdrCEF.exe 97 PID 3372 wrote to memory of 4716 3372 RdrCEF.exe 97 PID 3372 wrote to memory of 4716 3372 RdrCEF.exe 97 PID 3372 wrote to memory of 4716 3372 RdrCEF.exe 97 PID 3372 wrote to memory of 4716 3372 RdrCEF.exe 97 PID 3372 wrote to memory of 4716 3372 RdrCEF.exe 97 PID 3372 wrote to memory of 4716 3372 RdrCEF.exe 97 PID 3372 wrote to memory of 4716 3372 RdrCEF.exe 97 PID 3372 wrote to memory of 4716 3372 RdrCEF.exe 97 PID 3372 wrote to memory of 4716 3372 RdrCEF.exe 97 PID 3372 wrote to memory of 4716 3372 RdrCEF.exe 97 PID 3372 wrote to memory of 4716 3372 RdrCEF.exe 97 PID 3372 wrote to memory of 4716 3372 RdrCEF.exe 97 PID 3372 wrote to memory of 4716 3372 RdrCEF.exe 97 PID 3372 wrote to memory of 4716 3372 RdrCEF.exe 97
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1c29050eb34eb6d4a910695658b1c130.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A5692EBE40565414996A5AAA5B564B05 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4220
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=3458FA9AC832A4D2C4FC1D576A093077 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=3458FA9AC832A4D2C4FC1D576A093077 --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:13⤵PID:4716
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C09D2E322B4FEDDC5EF21D96AFADFDAF --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C09D2E322B4FEDDC5EF21D96AFADFDAF --renderer-client-id=4 --mojo-platform-channel-handle=2288 --allow-no-sandbox-job /prefetch:13⤵PID:4032
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=AABCDB4C994DEEE1371453324691E0E3 --mojo-platform-channel-handle=2436 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2276
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=600E86DA00AC337ADCDCAF83C018AE46 --mojo-platform-channel-handle=2680 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4208
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E4C3815FA247B44AAB646C768BA1FC76 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1172
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5e66ca13640780ef7d81cb857185b38fe
SHA17734576c254a2d68fd122059b6a2bb85dd5159dd
SHA256a2d62d4714fa6ecb9f5a5ae8f8814cfa145d0db9e093e85199a4d4c24dd2e21e
SHA5121e073c9b5acbbee7807ddac173a571a29263f29f8884061d71bc5a76f216d81e864b13363393c6dbea18df7bd1e877aef24c07e0babe12eee0a2f2778a4b15f1
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
22KB
MD54815577aea062a8e56a840069c451c29
SHA14393d71daf3a4e985e0cee2451e5eb6c4c799329
SHA2566d355593146b7ba35890c3ce3c86d84d6ab3e5135bf0c72d5b3f7d133ab85ca0
SHA512402707a4707279137741e87baa3ef5fd161669bf9c9202745ed78e59204e3671a3c84b3515e4ae93d321a17015281de71aa412623a224448b5533102d8d53d69