Analysis
-
max time kernel
156s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 23:29
Behavioral task
behavioral1
Sample
3e25a00ba9b3f06e55e83f75efb1e0b6.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3e25a00ba9b3f06e55e83f75efb1e0b6.pdf
Resource
win10v2004-20231215-en
General
-
Target
3e25a00ba9b3f06e55e83f75efb1e0b6.pdf
-
Size
90KB
-
MD5
3e25a00ba9b3f06e55e83f75efb1e0b6
-
SHA1
a504ecfb8c1503db4d5581644734676761f6afd9
-
SHA256
927f1849bc6c9d37b079aa9b68e6200b395690dab983d6c8a25a79368dba48e7
-
SHA512
b06541a323aee7a042faedadd8d37132666c7ec6bb39ae81d04778b8a3339caa89f27bcb9b78bcb13cbdf0ed4d37c92880167899fef1c1cd93bfe62aa09f8ae3
-
SSDEEP
1536:WatX+n4UVtwKVbaSZ6LKB6VhzQvNiKSmez0prWRw72HWUpO7zQc:N+jXwKVbaSQKGQF4meUG6267H
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4924 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe 4924 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4924 wrote to memory of 2664 4924 AcroRd32.exe 91 PID 4924 wrote to memory of 2664 4924 AcroRd32.exe 91 PID 4924 wrote to memory of 2664 4924 AcroRd32.exe 91 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 3020 2664 RdrCEF.exe 94 PID 2664 wrote to memory of 4768 2664 RdrCEF.exe 95 PID 2664 wrote to memory of 4768 2664 RdrCEF.exe 95 PID 2664 wrote to memory of 4768 2664 RdrCEF.exe 95 PID 2664 wrote to memory of 4768 2664 RdrCEF.exe 95 PID 2664 wrote to memory of 4768 2664 RdrCEF.exe 95 PID 2664 wrote to memory of 4768 2664 RdrCEF.exe 95 PID 2664 wrote to memory of 4768 2664 RdrCEF.exe 95 PID 2664 wrote to memory of 4768 2664 RdrCEF.exe 95 PID 2664 wrote to memory of 4768 2664 RdrCEF.exe 95 PID 2664 wrote to memory of 4768 2664 RdrCEF.exe 95 PID 2664 wrote to memory of 4768 2664 RdrCEF.exe 95 PID 2664 wrote to memory of 4768 2664 RdrCEF.exe 95 PID 2664 wrote to memory of 4768 2664 RdrCEF.exe 95 PID 2664 wrote to memory of 4768 2664 RdrCEF.exe 95 PID 2664 wrote to memory of 4768 2664 RdrCEF.exe 95 PID 2664 wrote to memory of 4768 2664 RdrCEF.exe 95 PID 2664 wrote to memory of 4768 2664 RdrCEF.exe 95 PID 2664 wrote to memory of 4768 2664 RdrCEF.exe 95 PID 2664 wrote to memory of 4768 2664 RdrCEF.exe 95 PID 2664 wrote to memory of 4768 2664 RdrCEF.exe 95
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3e25a00ba9b3f06e55e83f75efb1e0b6.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=459BBB2D2C4452EA3A3EECF388E06540 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3020
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=FCA932E449E60D9855468028098ECFE3 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=FCA932E449E60D9855468028098ECFE3 --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:13⤵PID:4768
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=EFCFC09D9CBC358632EA9DC13CDDCBF1 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=EFCFC09D9CBC358632EA9DC13CDDCBF1 --renderer-client-id=4 --mojo-platform-channel-handle=2184 --allow-no-sandbox-job /prefetch:13⤵PID:1992
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=AC9A28AE10AE20103B94D5F3FE232DCC --mojo-platform-channel-handle=2556 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3204
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3C740848D97E1E3F6EB739EFC4B5C449 --mojo-platform-channel-handle=1824 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1336
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=681F4A2E7EAC9DA5C94CF49599D40473 --mojo-platform-channel-handle=1940 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3384
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD55b86858780a0751ded42a5fe6c204964
SHA1db48e7d0a1a78a383a77df7183f234fac3ab6011
SHA2564d70ae74c6f1bfe3df8f8e84b80fe1301a0781d30c3e03c6d87f42c28b3b978d
SHA51229243cd250f7204f28b3f287402e0783ac59bee94fbffe40e47ada4dc6b519c256bb99f4aafd4fe16002909487a2ea8dc289acc70fb39b0baf150ebc167a240b