Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 15:12
Behavioral task
behavioral1
Sample
53dada00e3cd649d1ab0097b4b5aa2b5.pdf
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53dada00e3cd649d1ab0097b4b5aa2b5.pdf
Resource
win10v2004-20231215-en
General
-
Target
53dada00e3cd649d1ab0097b4b5aa2b5.pdf
-
Size
37KB
-
MD5
53dada00e3cd649d1ab0097b4b5aa2b5
-
SHA1
79ae6663cd10e8d093b17527d6bf2093a71a8d13
-
SHA256
12ed57d653ae4fb5391a8aa3e1440b89c00605b5a8d7720975176218ca3e07ac
-
SHA512
f369e664ff6683b740cc76827f1e7d3c4e39e5d2b9595598c4f2d0f5f3e42da389b582307d644c6df4aeacb75e587d145a7c2dca3eeb2e0b3c557b54e2bc0e96
-
SSDEEP
768:zhhUHXcdfPzLR0uNNw3rVndKgdOGdJumrPzOz7lmUux13odZ:jU3cdfPfR0uNNw3rXcGdJuCOtmZx1Yf
Malware Config
Signatures
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\AdobeFnt16.lst.3888 AcroRd32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\AdobeFnt16.lst.3888 AcroRd32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins3d\prc\AdobeFnt16.lst.3888 AcroRd32.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3888 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe 3888 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3888 wrote to memory of 552 3888 AcroRd32.exe 93 PID 3888 wrote to memory of 552 3888 AcroRd32.exe 93 PID 3888 wrote to memory of 552 3888 AcroRd32.exe 93 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 4600 552 RdrCEF.exe 95 PID 552 wrote to memory of 756 552 RdrCEF.exe 94 PID 552 wrote to memory of 756 552 RdrCEF.exe 94 PID 552 wrote to memory of 756 552 RdrCEF.exe 94 PID 552 wrote to memory of 756 552 RdrCEF.exe 94 PID 552 wrote to memory of 756 552 RdrCEF.exe 94 PID 552 wrote to memory of 756 552 RdrCEF.exe 94 PID 552 wrote to memory of 756 552 RdrCEF.exe 94 PID 552 wrote to memory of 756 552 RdrCEF.exe 94 PID 552 wrote to memory of 756 552 RdrCEF.exe 94 PID 552 wrote to memory of 756 552 RdrCEF.exe 94 PID 552 wrote to memory of 756 552 RdrCEF.exe 94 PID 552 wrote to memory of 756 552 RdrCEF.exe 94 PID 552 wrote to memory of 756 552 RdrCEF.exe 94 PID 552 wrote to memory of 756 552 RdrCEF.exe 94 PID 552 wrote to memory of 756 552 RdrCEF.exe 94 PID 552 wrote to memory of 756 552 RdrCEF.exe 94 PID 552 wrote to memory of 756 552 RdrCEF.exe 94 PID 552 wrote to memory of 756 552 RdrCEF.exe 94 PID 552 wrote to memory of 756 552 RdrCEF.exe 94 PID 552 wrote to memory of 756 552 RdrCEF.exe 94
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\53dada00e3cd649d1ab0097b4b5aa2b5.pdf"1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=7EEE47CFC33EEE7F21C8D880B2CF49F9 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=7EEE47CFC33EEE7F21C8D880B2CF49F9 --renderer-client-id=2 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job /prefetch:13⤵PID:756
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=3B49F74CBD828FED68238AD853ABF9F8 --mojo-platform-channel-handle=1772 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:4600
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=CD66144C47BCAACF4556F18FD843E763 --mojo-platform-channel-handle=2308 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2636
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A9EA6CB7B3C987304AED24958496FA50 --mojo-platform-channel-handle=1860 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:2944
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=837ADB5E319E0B2543BCC3FAA645E32E --mojo-platform-channel-handle=2456 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:1388
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=AB18F3E422D4CFC2A396AF2FC2DB7806 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=AB18F3E422D4CFC2A396AF2FC2DB7806 --renderer-client-id=6 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:13⤵PID:3192
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5fad0879c50aed8c4746ab7d15277e4a4
SHA15afb36c3c9689e248768a31d2dd673ec1f5ae2ab
SHA256578a199a28e868e596fcee17cdf66497fc64f1b48406a7082ec18428c35d8d34
SHA5121ea4a99c2291be5b3df2fdc6f366363612cb38c87cbd4be6d3b97ff3fedddae4d59dd958f3e9157654b668ee74c650ce6872f09d47a0e7e5a5434b26d46b7d5e