Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 06:53
Behavioral task
behavioral1
Sample
2c51a1f309a274493c8450d9276612d6.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2c51a1f309a274493c8450d9276612d6.pdf
Resource
win10v2004-20231215-en
General
-
Target
2c51a1f309a274493c8450d9276612d6.pdf
-
Size
86KB
-
MD5
2c51a1f309a274493c8450d9276612d6
-
SHA1
a0d245c73aba775286c4b6a51bd19a04f60edcb0
-
SHA256
445dc33d1422bfead8d3ed1bb11e56542078a21dbc27a7a2a4a94eb31d4d957f
-
SHA512
5b95724d27bc8329096a495bd5c103c8710f4fbd072540a09301720fbadd0d6066b2a0bf5b9ff9183ae3c3dd24a34841cf8cebaa3d3673615942eb0b9dec3bfa
-
SSDEEP
1536:P7PYrq0sfdu+bavFOaO9rOnQD206P1Q/wFWteeZLOTwAIW8pO+Fiy:TEsfAv899rOQZ6QwRsLOTvz+1
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3828 AcroRd32.exe 3828 AcroRd32.exe 3828 AcroRd32.exe 3828 AcroRd32.exe 3828 AcroRd32.exe 3828 AcroRd32.exe 3828 AcroRd32.exe 3828 AcroRd32.exe 3828 AcroRd32.exe 3828 AcroRd32.exe 3828 AcroRd32.exe 3828 AcroRd32.exe 3828 AcroRd32.exe 3828 AcroRd32.exe 3828 AcroRd32.exe 3828 AcroRd32.exe 3828 AcroRd32.exe 3828 AcroRd32.exe 3828 AcroRd32.exe 3828 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3828 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3828 AcroRd32.exe 3828 AcroRd32.exe 3828 AcroRd32.exe 3828 AcroRd32.exe 3828 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3828 wrote to memory of 1352 3828 AcroRd32.exe 90 PID 3828 wrote to memory of 1352 3828 AcroRd32.exe 90 PID 3828 wrote to memory of 1352 3828 AcroRd32.exe 90 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 3500 1352 RdrCEF.exe 94 PID 1352 wrote to memory of 1584 1352 RdrCEF.exe 93 PID 1352 wrote to memory of 1584 1352 RdrCEF.exe 93 PID 1352 wrote to memory of 1584 1352 RdrCEF.exe 93 PID 1352 wrote to memory of 1584 1352 RdrCEF.exe 93 PID 1352 wrote to memory of 1584 1352 RdrCEF.exe 93 PID 1352 wrote to memory of 1584 1352 RdrCEF.exe 93 PID 1352 wrote to memory of 1584 1352 RdrCEF.exe 93 PID 1352 wrote to memory of 1584 1352 RdrCEF.exe 93 PID 1352 wrote to memory of 1584 1352 RdrCEF.exe 93 PID 1352 wrote to memory of 1584 1352 RdrCEF.exe 93 PID 1352 wrote to memory of 1584 1352 RdrCEF.exe 93 PID 1352 wrote to memory of 1584 1352 RdrCEF.exe 93 PID 1352 wrote to memory of 1584 1352 RdrCEF.exe 93 PID 1352 wrote to memory of 1584 1352 RdrCEF.exe 93 PID 1352 wrote to memory of 1584 1352 RdrCEF.exe 93 PID 1352 wrote to memory of 1584 1352 RdrCEF.exe 93 PID 1352 wrote to memory of 1584 1352 RdrCEF.exe 93 PID 1352 wrote to memory of 1584 1352 RdrCEF.exe 93 PID 1352 wrote to memory of 1584 1352 RdrCEF.exe 93 PID 1352 wrote to memory of 1584 1352 RdrCEF.exe 93
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2c51a1f309a274493c8450d9276612d6.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=D58C62FD67AED0361AD37224EDF1966E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=D58C62FD67AED0361AD37224EDF1966E --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:13⤵PID:1584
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=AFBE1850664CEF78E18111F38707F57F --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3500
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A5CB0C72798AC1074962C4D7C6B90122 --mojo-platform-channel-handle=2308 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2300
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6BBD72D4841026415AEA388F5D9A0B13 --mojo-platform-channel-handle=2428 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4668
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=231D9383EAD957E0EA057075483F6746 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=231D9383EAD957E0EA057075483F6746 --renderer-client-id=6 --mojo-platform-channel-handle=2416 --allow-no-sandbox-job /prefetch:13⤵PID:4244
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E504C19BC272B0C0D5AFF0049B3CAB07 --mojo-platform-channel-handle=2552 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3988
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD57a8dff13e501e26ebcfdb9ad9bcf8a5a
SHA1411762318ac81c5f34f08252c6b4609b9aab0ea2
SHA2565bfb3098cca0a6b6ad488532181f08e0167b4dd6c6f1df9624331bfb5f18b600
SHA512ca62cd99440f351f72c9c91826347645ef597c184e2a2a6cd09b80d4ce508e0aaebce20928216b4dff2d4762d42d1bcf75061e8067e81bcd5e8e1f8b8ddc2529