Analysis
-
max time kernel
169s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 20:50
Behavioral task
behavioral1
Sample
1c329c55728f87a2e330bc845998f761.pdf
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
1c329c55728f87a2e330bc845998f761.pdf
Resource
win10v2004-20231215-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
1c329c55728f87a2e330bc845998f761.pdf
-
Size
34KB
-
MD5
1c329c55728f87a2e330bc845998f761
-
SHA1
c67961c11b64277b5c8fad91da79c9eb1e3e495f
-
SHA256
d7157f23ae03072d5ebea74d387aa2a07343ed9eee5e908626aa02a861192fe1
-
SHA512
82a98dc50d0746972bcbc4df5116e2e445d26ce6dea8d5b0fd01a70d1a67632c3076a0886c683afcc236382ece33c48d8571912d56ff7c548a213cc8b5a39ffb
-
SSDEEP
768:+TbZSViAuss7Intm6wliKiOMtp8cTOSrlg1gVf:+XNAuInA6zp8cTOShbVf
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4344 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4344 AcroRd32.exe 4344 AcroRd32.exe 4344 AcroRd32.exe 4344 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1c329c55728f87a2e330bc845998f761.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4344 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:2152
-