Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 19:28
Behavioral task
behavioral1
Sample
3adc42a942efd19a8f2c63c8dd97fa9e.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3adc42a942efd19a8f2c63c8dd97fa9e.pdf
Resource
win10v2004-20231222-en
General
-
Target
3adc42a942efd19a8f2c63c8dd97fa9e.pdf
-
Size
228KB
-
MD5
3adc42a942efd19a8f2c63c8dd97fa9e
-
SHA1
bd0b826edc6596e5f763c33ebb55f98538c4c7c6
-
SHA256
1fe50e59ebc62609343c0ca129429a00c95f53f9dfcacae8453b3fe6013ab2ac
-
SHA512
3e56a28163e76ac8071bb35987c12fba1aebc6ec82ce950379cc5db3c460e8a1c2be2676430db8b6b20545a5665e9bc10aa6b93ca8426ba161560804715a6035
-
SSDEEP
6144:t7EBhG0H83ARtuh79iRtKUOGb6XEdGRgUPPY4+6K0ylGT:e7rHS99U+Ed6P86Wlq
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4124 AcroRd32.exe 4124 AcroRd32.exe 4124 AcroRd32.exe 4124 AcroRd32.exe 4124 AcroRd32.exe 4124 AcroRd32.exe 4124 AcroRd32.exe 4124 AcroRd32.exe 4124 AcroRd32.exe 4124 AcroRd32.exe 4124 AcroRd32.exe 4124 AcroRd32.exe 4124 AcroRd32.exe 4124 AcroRd32.exe 4124 AcroRd32.exe 4124 AcroRd32.exe 4124 AcroRd32.exe 4124 AcroRd32.exe 4124 AcroRd32.exe 4124 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4124 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4124 AcroRd32.exe 4124 AcroRd32.exe 4124 AcroRd32.exe 4124 AcroRd32.exe 4124 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4124 wrote to memory of 4020 4124 AcroRd32.exe 92 PID 4124 wrote to memory of 4020 4124 AcroRd32.exe 92 PID 4124 wrote to memory of 4020 4124 AcroRd32.exe 92 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 1268 4020 RdrCEF.exe 94 PID 4020 wrote to memory of 4284 4020 RdrCEF.exe 93 PID 4020 wrote to memory of 4284 4020 RdrCEF.exe 93 PID 4020 wrote to memory of 4284 4020 RdrCEF.exe 93 PID 4020 wrote to memory of 4284 4020 RdrCEF.exe 93 PID 4020 wrote to memory of 4284 4020 RdrCEF.exe 93 PID 4020 wrote to memory of 4284 4020 RdrCEF.exe 93 PID 4020 wrote to memory of 4284 4020 RdrCEF.exe 93 PID 4020 wrote to memory of 4284 4020 RdrCEF.exe 93 PID 4020 wrote to memory of 4284 4020 RdrCEF.exe 93 PID 4020 wrote to memory of 4284 4020 RdrCEF.exe 93 PID 4020 wrote to memory of 4284 4020 RdrCEF.exe 93 PID 4020 wrote to memory of 4284 4020 RdrCEF.exe 93 PID 4020 wrote to memory of 4284 4020 RdrCEF.exe 93 PID 4020 wrote to memory of 4284 4020 RdrCEF.exe 93 PID 4020 wrote to memory of 4284 4020 RdrCEF.exe 93 PID 4020 wrote to memory of 4284 4020 RdrCEF.exe 93 PID 4020 wrote to memory of 4284 4020 RdrCEF.exe 93 PID 4020 wrote to memory of 4284 4020 RdrCEF.exe 93 PID 4020 wrote to memory of 4284 4020 RdrCEF.exe 93 PID 4020 wrote to memory of 4284 4020 RdrCEF.exe 93
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3adc42a942efd19a8f2c63c8dd97fa9e.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=99B88BA6CB363A9FDA89D479F616586D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=99B88BA6CB363A9FDA89D479F616586D --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:13⤵PID:4284
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A6DC3EF57FE0E14F3DF304E19278A559 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1268
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=41BC637DDF4665D5EE016DE9D55F4C9E --mojo-platform-channel-handle=2288 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4784
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8E18878B94C01C6BE9DE3DD464D50D25 --mojo-platform-channel-handle=2436 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2396
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B06C74D242C6330BC4A646C54DB22296 --mojo-platform-channel-handle=2412 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4844
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=2261809A243B6C7F5A3F3C457FA7586C --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=2261809A243B6C7F5A3F3C457FA7586C --renderer-client-id=7 --mojo-platform-channel-handle=2432 --allow-no-sandbox-job /prefetch:13⤵PID:2340
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD504d454fa5d28a04415d2533224c7bec5
SHA1abcc9f95d50b85f5acdb9df84160b8c3048b1251
SHA2567924b9a55f45ab28b7599a9f489e092bb36bcdc788a894018ba3ea8af64de2a1
SHA5120c425ba38e45e39baee7103ee3a1cb83dfc962ee13bc4192d96b21dfaaca94fc14adf39cd7f7baa9d2a04cb37f7d50ff6995ccd49c2042575c737018c5139d2a