Analysis
-
max time kernel
185s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 03:37
Behavioral task
behavioral1
Sample
26a1e111ba0faad4456d33de6b1e79c5.pdf
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
26a1e111ba0faad4456d33de6b1e79c5.pdf
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
26a1e111ba0faad4456d33de6b1e79c5.pdf
-
Size
84KB
-
MD5
26a1e111ba0faad4456d33de6b1e79c5
-
SHA1
43a6058ab234b2fb2cc3593fb34698e6323e13fe
-
SHA256
a7d081193499dbf2d890821ca2eb6e63dee5b2046464abb80aaeb3b78b5352a7
-
SHA512
42a2d76e5413df1f0b54764f64fb1d82079ac762e34099cc428ba91d53951a1458cacdb8c1896f1e0a7b57b973579fad28cae03f65fba463de133e35520dfe65
-
SSDEEP
1536:bloML7h4IOYldInGTPxzv1E/spsk+B5c+5Tc4mWupxYMFcdwUW6pOu2yPxdH:hoMLt4IumPxJeBk+B5c+p98pmMqqNu2a
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3380 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3380 AcroRd32.exe 3380 AcroRd32.exe 3380 AcroRd32.exe 3380 AcroRd32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3380 wrote to memory of 4812 3380 AcroRd32.exe 108 PID 3380 wrote to memory of 4812 3380 AcroRd32.exe 108 PID 3380 wrote to memory of 4812 3380 AcroRd32.exe 108 PID 3380 wrote to memory of 3984 3380 AcroRd32.exe 109 PID 3380 wrote to memory of 3984 3380 AcroRd32.exe 109 PID 3380 wrote to memory of 3984 3380 AcroRd32.exe 109
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\26a1e111ba0faad4456d33de6b1e79c5.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:4812
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:3984
-