Analysis
-
max time kernel
159s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 19:01
Behavioral task
behavioral1
Sample
41aa1be80027790a4800510338dbe835.pdf
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
41aa1be80027790a4800510338dbe835.pdf
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
41aa1be80027790a4800510338dbe835.pdf
-
Size
16KB
-
MD5
41aa1be80027790a4800510338dbe835
-
SHA1
8891ca5a72bd37e540104ef2cce06e4a5537de80
-
SHA256
e53561504bcaa7cc3490d76bd64767cb41b0cb3254bba6a1d564691466ab76ff
-
SHA512
2cc14aad32c3294ffa3e2027b92a9280d0fae82ef1b86c0fbd56df8b851c9016ceb605db41ee197d9458fe0027c0ed1e8d04953fb2dbd0fa271b8e7c8e4ab170
-
SSDEEP
384:VzZvyhMQz1WI8nqi6VEUwQSpwd8/nvxhuOXt9SmQ2Ury:VzBONz1WI8nqi6VEUwQSpwd8/nvxhuOL
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4236 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4236 AcroRd32.exe 4236 AcroRd32.exe 4236 AcroRd32.exe 4236 AcroRd32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4236 wrote to memory of 4044 4236 AcroRd32.exe 98 PID 4236 wrote to memory of 4044 4236 AcroRd32.exe 98 PID 4236 wrote to memory of 4044 4236 AcroRd32.exe 98 PID 4236 wrote to memory of 404 4236 AcroRd32.exe 111 PID 4236 wrote to memory of 404 4236 AcroRd32.exe 111 PID 4236 wrote to memory of 404 4236 AcroRd32.exe 111
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\41aa1be80027790a4800510338dbe835.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:4044
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:404
-