Analysis
-
max time kernel
169s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 17:32
Behavioral task
behavioral1
Sample
3aa48547ee3323fe0fb99746bfdf8b50.pdf
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3aa48547ee3323fe0fb99746bfdf8b50.pdf
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
3aa48547ee3323fe0fb99746bfdf8b50.pdf
-
Size
286KB
-
MD5
3aa48547ee3323fe0fb99746bfdf8b50
-
SHA1
b2b71243948583f5027910615b304fe79fc29193
-
SHA256
76946869ce5dcf07dd7b1f30a7407d9cd9bc728f3c0e7975f7314deee56cf205
-
SHA512
671dd062f4f409e82bcafb9a55b491c0113e9db9d94cd58e4ac390d81a9b8e8c9e275755fa5e80fae144f38e7e0d219b9f88b4ca6cd22b1579adda385ef30cd2
-
SSDEEP
6144:CC0Bh0AfNRRjL9Ed8gCLzHJ4Nav3qm37WzcBH/0OuZVlfT/9A:8BSyR95gESU60/fxuZrL6
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3280 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3280 AcroRd32.exe 3280 AcroRd32.exe 3280 AcroRd32.exe 3280 AcroRd32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3280 wrote to memory of 4904 3280 AcroRd32.exe 109 PID 3280 wrote to memory of 4904 3280 AcroRd32.exe 109 PID 3280 wrote to memory of 4904 3280 AcroRd32.exe 109
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3aa48547ee3323fe0fb99746bfdf8b50.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:4904
-