Analysis
-
max time kernel
171s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 16:28
Behavioral task
behavioral1
Sample
41593b99b70c4f8631c85d2364af7903.pdf
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
41593b99b70c4f8631c85d2364af7903.pdf
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
41593b99b70c4f8631c85d2364af7903.pdf
-
Size
48KB
-
MD5
41593b99b70c4f8631c85d2364af7903
-
SHA1
adc8b23f6ea22952d48593c54c2fc438615f95ce
-
SHA256
549a739cfbc172c81566c3c83d558ba248e037f5b9631cb8dd19ce07e0252fd0
-
SHA512
fb2d9984675ae97f2be6cfc1535de69141562ce0f8dfaec3d7140df91406a00249f2d36982c6273c2ed12d99a918b1bb4b2bdd5384c6a4b8aff9d92764b9c043
-
SSDEEP
768:4SMEZ4xYaGKW8yFwk7CGmOu3HpMB7JZRI5Jv4NaIXY07FAQS2sI:y698yyLNMJJ3+4a8Y0xUdI
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3560 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3560 AcroRd32.exe 3560 AcroRd32.exe 3560 AcroRd32.exe 3560 AcroRd32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3560 wrote to memory of 3008 3560 AcroRd32.exe 113 PID 3560 wrote to memory of 3008 3560 AcroRd32.exe 113 PID 3560 wrote to memory of 3008 3560 AcroRd32.exe 113
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\41593b99b70c4f8631c85d2364af7903.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:3008
-