Analysis
-
max time kernel
154s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2024 10:46
Behavioral task
behavioral1
Sample
48c2ca7360be63d22c45f3d24966936c.pdf
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
48c2ca7360be63d22c45f3d24966936c.pdf
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
48c2ca7360be63d22c45f3d24966936c.pdf
-
Size
35KB
-
MD5
48c2ca7360be63d22c45f3d24966936c
-
SHA1
ac7c4557e1f095e8683cecc8ae6cf96e4f8c300d
-
SHA256
0b81c1a1bbaffbfe040c9829d91e76ba11c1cd3a00012b42652580445fbe0f50
-
SHA512
bc1f7aa23e33de52097a9192c97f40241598b9fc082c95ef50fd0134e788665d49ea31841219563b5d47c6d8809a903b87b0b6b09953065f7704d5a41847e5d5
-
SSDEEP
768:ATWlOWvrkN3SuTTqiUoX6/TkA7b55aDSBMsj:A6lOBTpATl5a2BMsj
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3576 AcroRd32.exe 3576 AcroRd32.exe 3576 AcroRd32.exe 3576 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\48c2ca7360be63d22c45f3d24966936c.pdf"1⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:3576