Analysis
-
max time kernel
173s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:09
Behavioral task
behavioral1
Sample
23fd25cf4687b5cb4674cd8b6f5cd303.pdf
Resource
win7-20231215-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
23fd25cf4687b5cb4674cd8b6f5cd303.pdf
Resource
win10v2004-20231215-en
3 signatures
150 seconds
General
-
Target
23fd25cf4687b5cb4674cd8b6f5cd303.pdf
-
Size
13KB
-
MD5
23fd25cf4687b5cb4674cd8b6f5cd303
-
SHA1
0f351d248e5ff7c5c602a4cbfcc035cf0c7f6f69
-
SHA256
459ad0c02dd953ab8b4862ecc900745fdb2e5ecfc2aa559b27921aa805803bda
-
SHA512
466ce68af147a3ee26bb0ab0cfe20673824fe257be9c1861ecc67dfb995520585310ab123b6cd4afccca76f2f5c1556ef9582ef20c0ccf8150b5863fd4ed4c9c
-
SSDEEP
384:DLEMMLEtysyLhogeF4GY5feF4GY5Tv5RW9IEUo0q98pRPFOF++:Dg/gYhogecew5RbEUo0a3
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4520 AcroRd32.exe 4520 AcroRd32.exe 4520 AcroRd32.exe 4520 AcroRd32.exe 4520 AcroRd32.exe 4520 AcroRd32.exe 4520 AcroRd32.exe 4520 AcroRd32.exe 4520 AcroRd32.exe 4520 AcroRd32.exe 4520 AcroRd32.exe 4520 AcroRd32.exe 4520 AcroRd32.exe 4520 AcroRd32.exe 4520 AcroRd32.exe 4520 AcroRd32.exe 4520 AcroRd32.exe 4520 AcroRd32.exe 4520 AcroRd32.exe 4520 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4520 AcroRd32.exe 4520 AcroRd32.exe 4520 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\23fd25cf4687b5cb4674cd8b6f5cd303.pdf"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4520