Analysis
-
max time kernel
163s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2024 13:24
Behavioral task
behavioral1
Sample
4b8e583ce93686ff6dd1348a924a8b7e.pdf
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
4b8e583ce93686ff6dd1348a924a8b7e.pdf
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
4b8e583ce93686ff6dd1348a924a8b7e.pdf
-
Size
83KB
-
MD5
4b8e583ce93686ff6dd1348a924a8b7e
-
SHA1
32cba774765dc22a82424158882a9bc5c68e16d4
-
SHA256
18b1da3ced6478fcb8398f288d7877654798dccdea8ca48d14b06ac79e899a9c
-
SHA512
ae7bff87628434aa6fd4bde58bf0024c2b95770f63a1fa0bc0283054630fd149fbd77cce9dec004029d89568fb7e568be90790ed5ae672af9b3368ca0086ce87
-
SSDEEP
1536:mnNUtV48Qt5ynvezRwUIEKN5cBrtuKquLdd4qtQsDBTQ0J3d+pW6pOu26W34mJYm:z68qaveNL/K0BBu+5fQs1Jd+Ku2mmM9q
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1016 AcroRd32.exe 1016 AcroRd32.exe 1016 AcroRd32.exe 1016 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\4b8e583ce93686ff6dd1348a924a8b7e.pdf"1⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:1016