Analysis
-
max time kernel
153s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 14:12
Behavioral task
behavioral1
Sample
50c562c27f029907c230e1c9c9026cee.pdf
Resource
win7-20231215-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
50c562c27f029907c230e1c9c9026cee.pdf
Resource
win10v2004-20231215-en
2 signatures
150 seconds
General
-
Target
50c562c27f029907c230e1c9c9026cee.pdf
-
Size
85KB
-
MD5
50c562c27f029907c230e1c9c9026cee
-
SHA1
72eca31c319a0dbff3e694dcab2e55788b7be8d5
-
SHA256
eda02c4e75473ed29ce8a27f49599db0e6fdcf915f57685b38b3bf4280d6a7d8
-
SHA512
d45029be6ae8637529cd9f5ea0031393c18876b2008fb1c85633fa217afd8a0256c1bd4961574e1613b18b8f99ee1585a23dd82e281ff7ca0952ae0b40623a69
-
SSDEEP
1536:I6GJdhFeXkBrek0wzASuVs0gIREFRXtFAY06deAYSKUOk6cWYpO2+WKzyKZcGvch:EdqUJ50PSulgIkR9v06deAYdT2cWK9vs
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1708 AcroRd32.exe 1708 AcroRd32.exe 1708 AcroRd32.exe 1708 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\50c562c27f029907c230e1c9c9026cee.pdf"1⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:1708