Analysis
-
max time kernel
149s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 01:08
Behavioral task
behavioral1
Sample
4f2e1abbe3d53efa446ea9664bc01e15.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4f2e1abbe3d53efa446ea9664bc01e15.pdf
Resource
win10v2004-20231222-en
General
-
Target
4f2e1abbe3d53efa446ea9664bc01e15.pdf
-
Size
81KB
-
MD5
4f2e1abbe3d53efa446ea9664bc01e15
-
SHA1
e89f19bd8db1908d91493da8e07b9accc8a09f03
-
SHA256
56cb680c6096296f9e56f64e01eeed20bef2a31f5b31159f74c99bf93e00b346
-
SHA512
d312cb6149b859d18a4947407d177bc19d3e46e486e2fb9d457cd43d2700b1092bc646f5492261181ca8469914632566cd2ad486081f3436e205f575a165e749
-
SSDEEP
1536:Cm9CUZ1TZP5ytEZ6YKJMiy28stfMyZ0REfxWapOtQHWxQR/wviQCiukl:vZbPctEsY2h9JMc0REf+tQgQR/w6Py
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4232 AcroRd32.exe 4232 AcroRd32.exe 4232 AcroRd32.exe 4232 AcroRd32.exe 4232 AcroRd32.exe 4232 AcroRd32.exe 4232 AcroRd32.exe 4232 AcroRd32.exe 4232 AcroRd32.exe 4232 AcroRd32.exe 4232 AcroRd32.exe 4232 AcroRd32.exe 4232 AcroRd32.exe 4232 AcroRd32.exe 4232 AcroRd32.exe 4232 AcroRd32.exe 4232 AcroRd32.exe 4232 AcroRd32.exe 4232 AcroRd32.exe 4232 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4232 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4232 AcroRd32.exe 4232 AcroRd32.exe 4232 AcroRd32.exe 4232 AcroRd32.exe 4232 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4232 wrote to memory of 4796 4232 AcroRd32.exe 92 PID 4232 wrote to memory of 4796 4232 AcroRd32.exe 92 PID 4232 wrote to memory of 4796 4232 AcroRd32.exe 92 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1148 4796 RdrCEF.exe 94 PID 4796 wrote to memory of 1916 4796 RdrCEF.exe 93 PID 4796 wrote to memory of 1916 4796 RdrCEF.exe 93 PID 4796 wrote to memory of 1916 4796 RdrCEF.exe 93 PID 4796 wrote to memory of 1916 4796 RdrCEF.exe 93 PID 4796 wrote to memory of 1916 4796 RdrCEF.exe 93 PID 4796 wrote to memory of 1916 4796 RdrCEF.exe 93 PID 4796 wrote to memory of 1916 4796 RdrCEF.exe 93 PID 4796 wrote to memory of 1916 4796 RdrCEF.exe 93 PID 4796 wrote to memory of 1916 4796 RdrCEF.exe 93 PID 4796 wrote to memory of 1916 4796 RdrCEF.exe 93 PID 4796 wrote to memory of 1916 4796 RdrCEF.exe 93 PID 4796 wrote to memory of 1916 4796 RdrCEF.exe 93 PID 4796 wrote to memory of 1916 4796 RdrCEF.exe 93 PID 4796 wrote to memory of 1916 4796 RdrCEF.exe 93 PID 4796 wrote to memory of 1916 4796 RdrCEF.exe 93 PID 4796 wrote to memory of 1916 4796 RdrCEF.exe 93 PID 4796 wrote to memory of 1916 4796 RdrCEF.exe 93 PID 4796 wrote to memory of 1916 4796 RdrCEF.exe 93 PID 4796 wrote to memory of 1916 4796 RdrCEF.exe 93 PID 4796 wrote to memory of 1916 4796 RdrCEF.exe 93
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\4f2e1abbe3d53efa446ea9664bc01e15.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=72C4859A66BB30794500FC6CB068A736 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=72C4859A66BB30794500FC6CB068A736 --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:13⤵PID:1916
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F5969DC50E3C6A603B161986089A5F3F --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1148
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E76C134929DEB70FFCF10E378EF7295D --mojo-platform-channel-handle=2296 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4880
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=777B85F065488E80F6C61A848367C185 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=777B85F065488E80F6C61A848367C185 --renderer-client-id=6 --mojo-platform-channel-handle=1732 --allow-no-sandbox-job /prefetch:13⤵PID:3420
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1BA5F3B2A42557AC6214428AB80B20C1 --mojo-platform-channel-handle=2540 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:364
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E03EFDA90B02D7A6530540A80C85FF2B --mojo-platform-channel-handle=1944 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3108
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD58306575b2e9947679b3768a9fa0ddb22
SHA1c79cb3e35579421d16479591e6849e5483379f47
SHA256d8088120c3ce199b51798ecdc742652f8b4cc4caa713f5e0c546edd8dc0bcc0c
SHA512249c71e074d54343954c1523ac46bfb8cb8ba791aa63ba19422c7f2d557964dddd1693f85567650e590b24f06afcb90ed8c44dbbd49056e3e1b47b27cefafd4d
-
Filesize
56KB
MD5c26ed30e7d5ab440480838636efc41db
SHA1c66e0d00b56abebfb60d2fcc5cf85ad31a0d6591
SHA2566a3c5c4a8e57f77ecc22078fbf603ecc31fb82d429bd87b7b4b9261447092aef
SHA51296cdb78bca3e01d4513c31661987e5646e6a8ff24708918aa0d66dfa3ca5d98af4862c9f38c4f41f933c345d2d3adfb1d34d1430b33f45f916f41a9872a030df
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5