Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 01:08
Behavioral task
behavioral1
Sample
1ab44271485de1d90c79ef981a384468.pdf
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1ab44271485de1d90c79ef981a384468.pdf
Resource
win10v2004-20231222-en
General
-
Target
1ab44271485de1d90c79ef981a384468.pdf
-
Size
221KB
-
MD5
1ab44271485de1d90c79ef981a384468
-
SHA1
eff68dafac4c6754b0606cbbc6b421023ff9a60a
-
SHA256
5c42097f3179542761ea49009ffd6dfd2f33cc99e4d3595039306b53826ac3b9
-
SHA512
6703dac0cfdd5e5a252b738910bbfd5984f73ac7230da134cf0cad8f0ca4fef954d422d1ba577517570d5b8d211f13f87a61d0ca1ca7c7ce20e219831397390c
-
SSDEEP
3072:Ht52YK7YvFJ9xaJswniFkXbNXFILLahjeMmM+g:N52rm9xa/bNXFILLahje1M
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3768 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe 3768 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3768 wrote to memory of 4512 3768 AcroRd32.exe 91 PID 3768 wrote to memory of 4512 3768 AcroRd32.exe 91 PID 3768 wrote to memory of 4512 3768 AcroRd32.exe 91 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 2728 4512 RdrCEF.exe 93 PID 4512 wrote to memory of 3216 4512 RdrCEF.exe 92 PID 4512 wrote to memory of 3216 4512 RdrCEF.exe 92 PID 4512 wrote to memory of 3216 4512 RdrCEF.exe 92 PID 4512 wrote to memory of 3216 4512 RdrCEF.exe 92 PID 4512 wrote to memory of 3216 4512 RdrCEF.exe 92 PID 4512 wrote to memory of 3216 4512 RdrCEF.exe 92 PID 4512 wrote to memory of 3216 4512 RdrCEF.exe 92 PID 4512 wrote to memory of 3216 4512 RdrCEF.exe 92 PID 4512 wrote to memory of 3216 4512 RdrCEF.exe 92 PID 4512 wrote to memory of 3216 4512 RdrCEF.exe 92 PID 4512 wrote to memory of 3216 4512 RdrCEF.exe 92 PID 4512 wrote to memory of 3216 4512 RdrCEF.exe 92 PID 4512 wrote to memory of 3216 4512 RdrCEF.exe 92 PID 4512 wrote to memory of 3216 4512 RdrCEF.exe 92 PID 4512 wrote to memory of 3216 4512 RdrCEF.exe 92 PID 4512 wrote to memory of 3216 4512 RdrCEF.exe 92 PID 4512 wrote to memory of 3216 4512 RdrCEF.exe 92 PID 4512 wrote to memory of 3216 4512 RdrCEF.exe 92 PID 4512 wrote to memory of 3216 4512 RdrCEF.exe 92 PID 4512 wrote to memory of 3216 4512 RdrCEF.exe 92
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1ab44271485de1d90c79ef981a384468.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=FE3DA5EE13439576B431752D744D5CB6 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=FE3DA5EE13439576B431752D744D5CB6 --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:13⤵PID:3216
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3CC648F62676E28B641FEF8A33CE65C8 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2728
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E4811BED100FE3AEB9F3F2BFB149512F --mojo-platform-channel-handle=2284 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3484
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7584643BD64EDA7C04604FB65088AC17 --mojo-platform-channel-handle=2320 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4240
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=DD8E91916D01DAF161D30229C89E18FE --mojo-platform-channel-handle=2480 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4680
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=F984F8C46F146A43A764B68FD4FE0600 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=F984F8C46F146A43A764B68FD4FE0600 --renderer-client-id=7 --mojo-platform-channel-handle=2336 --allow-no-sandbox-job /prefetch:13⤵PID:4636
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b672b73ee03fbbd69ee16f2f1ab50d93
SHA1470986b80eda0f250fa1bd40ad89ee31174336a4
SHA2565e5dd5b46c28f87198fa8b4fb85e483770d1a129087058aad86aa6d32963fcdb
SHA51271188d895defe18c020d38f43cb8d3aac03c8e610197140037fc49714312cee79193e6aff16b9d220cb8a9a9d71ad61cc04f540b90a2618e7a3830725c91b0e0