Analysis

  • max time kernel
    156s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-01-2024 06:43

General

  • Target

    458d70b7fcff6d59dbaa6c0c125b9845.pdf

  • Size

    94KB

  • MD5

    458d70b7fcff6d59dbaa6c0c125b9845

  • SHA1

    ecc8d3dc958ab1f8cc1c85a5cdd96d679b56a6d0

  • SHA256

    ce815418f62d7c27827dda74316485cd9ecb637619b3725f6c23163b1c44eff0

  • SHA512

    ceb886ae5aea03c08ba52f99c9c18d5529928d56cd1126aecc184f699545e7b86686db5419deba8d58ed20b4442f31a3fc481de5c92a09e5325c7b7c64cdcc98

  • SSDEEP

    1536:zQfaWZzwt1XtIWXMzlx3paPTxX3SrZPDVKQRVWBWHhYQ8JHL6mWvCGJW8pO7aipW:cikcXXDX+H5aPTVIBVKSCVLWvCGg7p54

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\458d70b7fcff6d59dbaa6c0c125b9845.pdf"
    1⤵
    • Checks processor information in registry
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1540
    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
      2⤵
        PID:3452

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads