Analysis
-
max time kernel
146s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2024 21:29
Behavioral task
behavioral1
Sample
51ab2aa71b57e0b9e6ee154ad9f1fad6.pdf
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
51ab2aa71b57e0b9e6ee154ad9f1fad6.pdf
Resource
win10v2004-20231222-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
51ab2aa71b57e0b9e6ee154ad9f1fad6.pdf
-
Size
85KB
-
MD5
51ab2aa71b57e0b9e6ee154ad9f1fad6
-
SHA1
32035ce61360ca7c3268498e66717921d436e09a
-
SHA256
e1c4cc7e1640302a0efcf38a125229e2d74762ee986ae23848336bbdb9e5f2cf
-
SHA512
bc56d604d3c544c64fde36edea8ebc464439220aefc4e2bf06e8f161cafb68936c0039e2d078c9219bdcc4a66763cd2e15440aa420346c640eab61130a5ed4fa
-
SSDEEP
1536:Qn8KBwF7tKKkClAYSxJ2cnqedbhT1agWWWIDytHjTZfJ6WcpOmil/AJf+:wBKBbkkAYyJ2cnfdbp1a08HjTZfJ9mV0
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2276 AcroRd32.exe 2276 AcroRd32.exe 2276 AcroRd32.exe 2276 AcroRd32.exe 2276 AcroRd32.exe 2276 AcroRd32.exe 2276 AcroRd32.exe 2276 AcroRd32.exe 2276 AcroRd32.exe 2276 AcroRd32.exe 2276 AcroRd32.exe 2276 AcroRd32.exe 2276 AcroRd32.exe 2276 AcroRd32.exe 2276 AcroRd32.exe 2276 AcroRd32.exe 2276 AcroRd32.exe 2276 AcroRd32.exe 2276 AcroRd32.exe 2276 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2276 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2276 AcroRd32.exe 2276 AcroRd32.exe 2276 AcroRd32.exe 2276 AcroRd32.exe 2276 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2276 wrote to memory of 4828 2276 AcroRd32.exe 93 PID 2276 wrote to memory of 4828 2276 AcroRd32.exe 93 PID 2276 wrote to memory of 4828 2276 AcroRd32.exe 93 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 1732 4828 RdrCEF.exe 97 PID 4828 wrote to memory of 4988 4828 RdrCEF.exe 96 PID 4828 wrote to memory of 4988 4828 RdrCEF.exe 96 PID 4828 wrote to memory of 4988 4828 RdrCEF.exe 96 PID 4828 wrote to memory of 4988 4828 RdrCEF.exe 96 PID 4828 wrote to memory of 4988 4828 RdrCEF.exe 96 PID 4828 wrote to memory of 4988 4828 RdrCEF.exe 96 PID 4828 wrote to memory of 4988 4828 RdrCEF.exe 96 PID 4828 wrote to memory of 4988 4828 RdrCEF.exe 96 PID 4828 wrote to memory of 4988 4828 RdrCEF.exe 96 PID 4828 wrote to memory of 4988 4828 RdrCEF.exe 96 PID 4828 wrote to memory of 4988 4828 RdrCEF.exe 96 PID 4828 wrote to memory of 4988 4828 RdrCEF.exe 96 PID 4828 wrote to memory of 4988 4828 RdrCEF.exe 96 PID 4828 wrote to memory of 4988 4828 RdrCEF.exe 96 PID 4828 wrote to memory of 4988 4828 RdrCEF.exe 96 PID 4828 wrote to memory of 4988 4828 RdrCEF.exe 96 PID 4828 wrote to memory of 4988 4828 RdrCEF.exe 96 PID 4828 wrote to memory of 4988 4828 RdrCEF.exe 96 PID 4828 wrote to memory of 4988 4828 RdrCEF.exe 96 PID 4828 wrote to memory of 4988 4828 RdrCEF.exe 96
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\51ab2aa71b57e0b9e6ee154ad9f1fad6.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=BF8448B9E73F82EFBA856892A229C620 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=BF8448B9E73F82EFBA856892A229C620 --renderer-client-id=2 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job /prefetch:13⤵PID:4988
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=34511A6FE7CF10C3C0FE02EB64979172 --mojo-platform-channel-handle=1708 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1732
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8BA23EB45D5F02EA6468AF3DBD0A2D7F --mojo-platform-channel-handle=2280 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3900
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B1753F64B5494749936B6D740D949E42 --mojo-platform-channel-handle=1884 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4680
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0E3C8D1266D37520A2FAB98AFCF2D4AE --mojo-platform-channel-handle=2412 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1416
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=4714875E12DF91736FEE22A06C20EEF2 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=4714875E12DF91736FEE22A06C20EEF2 --renderer-client-id=7 --mojo-platform-channel-handle=1896 --allow-no-sandbox-job /prefetch:13⤵PID:3164
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2784