Analysis
-
max time kernel
168s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 12:38
Behavioral task
behavioral1
Sample
509372e2f02812281e439ed15f2046e9.pdf
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
509372e2f02812281e439ed15f2046e9.pdf
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
509372e2f02812281e439ed15f2046e9.pdf
-
Size
15KB
-
MD5
509372e2f02812281e439ed15f2046e9
-
SHA1
fff703d336f35da9b3d95c4b528b07327d76a933
-
SHA256
28e9d3b2c5a91ba71a7fd84e1e462dcb2dbd5e4c7a7fc51f022d062ff49889f6
-
SHA512
4920c7c32697170c92626f26ec9e2faa4b66a07ea96fb6f0efd16aafe7c2bad87fd74a10a3c1873a5a0b13d4ac0127aa3f64e3fa9dc2b193d47763c735c1dfa6
-
SSDEEP
384:VziFP/ez1CeX1rGUjaKYdH2A+KMUBkjwoguwxOc80oZAnhZqSdH5v321vXxUixJ4:VzAXez1XXdGo/Yl2AjMOkXghOJ0oZIhz
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1484 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe 1484 AcroRd32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1484 wrote to memory of 3732 1484 AcroRd32.exe 102 PID 1484 wrote to memory of 3732 1484 AcroRd32.exe 102 PID 1484 wrote to memory of 3732 1484 AcroRd32.exe 102 PID 1484 wrote to memory of 3176 1484 AcroRd32.exe 103 PID 1484 wrote to memory of 3176 1484 AcroRd32.exe 103 PID 1484 wrote to memory of 3176 1484 AcroRd32.exe 103
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\509372e2f02812281e439ed15f2046e9.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:3732
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵PID:3176
-