Analysis
-
max time kernel
158s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 07:00
Behavioral task
behavioral1
Sample
2c8675ad511e723caf23061233cea3c1.pdf
Resource
win7-20231129-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
2c8675ad511e723caf23061233cea3c1.pdf
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
2c8675ad511e723caf23061233cea3c1.pdf
-
Size
12KB
-
MD5
2c8675ad511e723caf23061233cea3c1
-
SHA1
67bfb2b9de2241ee50796f15a17d8569a4c3260f
-
SHA256
426cb899615c32c7f6d79180b34fbd5efe3996e17c9ee56a5bf84480a762c356
-
SHA512
c1f2d39e1bb7a944499ed580df0470ca32bbcd3c715dadb4d5c1b58df76f185444c883b39563152a4ba1aefdc4e597af63f0cfe6dff24241aed7c421ff203449
-
SSDEEP
384:bONbedw+lJ5DyjWFPQwC1xVKQdBImrtYhSm1YjP+bKoK3SQusI91E1Baa8G9RrnO:ByjWRY1xVKQdBImRYNESQusI9K1B78Gy
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2384 AcroRd32.exe 2384 AcroRd32.exe 2384 AcroRd32.exe 2384 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\2c8675ad511e723caf23061233cea3c1.pdf"1⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:2384