Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 00:57
Behavioral task
behavioral1
Sample
22600919685166120be4fd449c9415df.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
22600919685166120be4fd449c9415df.pdf
Resource
win10v2004-20231222-en
General
-
Target
22600919685166120be4fd449c9415df.pdf
-
Size
34KB
-
MD5
22600919685166120be4fd449c9415df
-
SHA1
d1510c9710b595bafb7a6599e473947571e479ca
-
SHA256
8eb3c68f1b9ce8cfc0379f65e86db493c91210e85cfd8f63b85b98cffbe95b6b
-
SHA512
13c4688e925a113d202989c5702071e68cc65356575226b3bbadaf68315fb57c40c90fd1ce4296861e4fe6dae8d677b22f04e979c03c689d3fae38dbd13c34d1
-
SSDEEP
768:/OJOkCFMR6rgsKi8HvI/uI+Ab+9FaIRRx+bMeNjK:msk2uHvMM0IRqLNjK
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4360 AcroRd32.exe 4360 AcroRd32.exe 4360 AcroRd32.exe 4360 AcroRd32.exe 4360 AcroRd32.exe 4360 AcroRd32.exe 4360 AcroRd32.exe 4360 AcroRd32.exe 4360 AcroRd32.exe 4360 AcroRd32.exe 4360 AcroRd32.exe 4360 AcroRd32.exe 4360 AcroRd32.exe 4360 AcroRd32.exe 4360 AcroRd32.exe 4360 AcroRd32.exe 4360 AcroRd32.exe 4360 AcroRd32.exe 4360 AcroRd32.exe 4360 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4360 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4360 AcroRd32.exe 4360 AcroRd32.exe 4360 AcroRd32.exe 4360 AcroRd32.exe 4360 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4360 wrote to memory of 4500 4360 AcroRd32.exe 94 PID 4360 wrote to memory of 4500 4360 AcroRd32.exe 94 PID 4360 wrote to memory of 4500 4360 AcroRd32.exe 94 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 2672 4500 RdrCEF.exe 96 PID 4500 wrote to memory of 4344 4500 RdrCEF.exe 95 PID 4500 wrote to memory of 4344 4500 RdrCEF.exe 95 PID 4500 wrote to memory of 4344 4500 RdrCEF.exe 95 PID 4500 wrote to memory of 4344 4500 RdrCEF.exe 95 PID 4500 wrote to memory of 4344 4500 RdrCEF.exe 95 PID 4500 wrote to memory of 4344 4500 RdrCEF.exe 95 PID 4500 wrote to memory of 4344 4500 RdrCEF.exe 95 PID 4500 wrote to memory of 4344 4500 RdrCEF.exe 95 PID 4500 wrote to memory of 4344 4500 RdrCEF.exe 95 PID 4500 wrote to memory of 4344 4500 RdrCEF.exe 95 PID 4500 wrote to memory of 4344 4500 RdrCEF.exe 95 PID 4500 wrote to memory of 4344 4500 RdrCEF.exe 95 PID 4500 wrote to memory of 4344 4500 RdrCEF.exe 95 PID 4500 wrote to memory of 4344 4500 RdrCEF.exe 95 PID 4500 wrote to memory of 4344 4500 RdrCEF.exe 95 PID 4500 wrote to memory of 4344 4500 RdrCEF.exe 95 PID 4500 wrote to memory of 4344 4500 RdrCEF.exe 95 PID 4500 wrote to memory of 4344 4500 RdrCEF.exe 95 PID 4500 wrote to memory of 4344 4500 RdrCEF.exe 95 PID 4500 wrote to memory of 4344 4500 RdrCEF.exe 95
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\22600919685166120be4fd449c9415df.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=475E776C34A5719387881E5487F9DCFA --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=475E776C34A5719387881E5487F9DCFA --renderer-client-id=2 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job /prefetch:13⤵PID:4344
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F5C74C694ECBB6D66297C586D3C6AA45 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2672
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=43F70374C86A634E823FDCD9E14ADFAA --mojo-platform-channel-handle=2284 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1676
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6B549B869CF1B517B9369E9A068F5408 --mojo-platform-channel-handle=1796 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3328
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=84586E7D231069E7CFD816F9A7EE9436 --mojo-platform-channel-handle=2300 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2976
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=D809DD3CD8516CDF79241B03D2FD971E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=D809DD3CD8516CDF79241B03D2FD971E --renderer-client-id=7 --mojo-platform-channel-handle=1928 --allow-no-sandbox-job /prefetch:13⤵PID:2828
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD57672576f80a96ee39de44caffcba4032
SHA1f220137b0fc499c8bba157a658f9700b03aebecc
SHA25630c40ab713ce90bfb128d05936cdbf0f438b4595a194b7b70461f9833c9778a5
SHA512a1ad51f3af515c56f115d1f54f3bde67ae0700b38b56c7ca10b8f170cc1bdace950601bf121be74a6802be07f7358a3d01b0785fd3e9f62c17b3e3966a3ddfe4
-
Filesize
56KB
MD5c26ed30e7d5ab440480838636efc41db
SHA1c66e0d00b56abebfb60d2fcc5cf85ad31a0d6591
SHA2566a3c5c4a8e57f77ecc22078fbf603ecc31fb82d429bd87b7b4b9261447092aef
SHA51296cdb78bca3e01d4513c31661987e5646e6a8ff24708918aa0d66dfa3ca5d98af4862c9f38c4f41f933c345d2d3adfb1d34d1430b33f45f916f41a9872a030df
-
Filesize
32KB
MD5eb2d67e01fb1ca34cfde38787e2a052e
SHA11f21d4553dce24983469463d26da9a5f76a9877d
SHA256cb3dfadbb4f69b8fc4e439797332624d1c72659536719262eb1e1f7922ef46b3
SHA512a5b2c1d688770b296ea23da294cf50d7c8628224906b29611122c932ce3a61fbbdffc682dbe1a645f6599ad6e4117f72c520022992251d4e095ea51887805de9