Analysis
-
max time kernel
11s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
22/01/2024, 14:29
Behavioral task
behavioral1
Sample
Smart Manufacturing Excellence Summit 2024.pdf
Resource
win10-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
Smart Manufacturing Excellence Summit 2024.pdf
Resource
win11-20231215-en
6 signatures
150 seconds
General
-
Target
Smart Manufacturing Excellence Summit 2024.pdf
-
Size
2.1MB
-
MD5
13c688a7d0cd2d3cf2b232a6a6c0fc6b
-
SHA1
0f1b7129904d0d7acd16a3e179d0e9e68410eb8f
-
SHA256
e24cf29b0cf0e49f73ed57ff44ac8d58faa058654bc3ba8f1cd070c14bf50c47
-
SHA512
47fe3d78afbdfd3697d35d183835077e9dc07c5ce12f3fa7fae51a8fce191a7e3764a109048d959d140bfd1f1a09d7c1154e193c33a68307596f19524d3f304c
-
SSDEEP
49152:7KHhDVY7V6Z9ShVEFEfJMcSMP2kQw5tUU5rfcL5OnT0/VkTv8+Fnx8Zl:j8A2FrcxQw5l8t/VxUaf
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4068299709-2976237847-2753307267-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1312 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe 1312 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1312 wrote to memory of 4560 1312 AcroRd32.exe 72 PID 1312 wrote to memory of 4560 1312 AcroRd32.exe 72 PID 1312 wrote to memory of 4560 1312 AcroRd32.exe 72 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 3632 4560 RdrCEF.exe 73 PID 4560 wrote to memory of 5060 4560 RdrCEF.exe 74 PID 4560 wrote to memory of 5060 4560 RdrCEF.exe 74 PID 4560 wrote to memory of 5060 4560 RdrCEF.exe 74 PID 4560 wrote to memory of 5060 4560 RdrCEF.exe 74 PID 4560 wrote to memory of 5060 4560 RdrCEF.exe 74 PID 4560 wrote to memory of 5060 4560 RdrCEF.exe 74 PID 4560 wrote to memory of 5060 4560 RdrCEF.exe 74 PID 4560 wrote to memory of 5060 4560 RdrCEF.exe 74 PID 4560 wrote to memory of 5060 4560 RdrCEF.exe 74 PID 4560 wrote to memory of 5060 4560 RdrCEF.exe 74 PID 4560 wrote to memory of 5060 4560 RdrCEF.exe 74 PID 4560 wrote to memory of 5060 4560 RdrCEF.exe 74 PID 4560 wrote to memory of 5060 4560 RdrCEF.exe 74 PID 4560 wrote to memory of 5060 4560 RdrCEF.exe 74 PID 4560 wrote to memory of 5060 4560 RdrCEF.exe 74 PID 4560 wrote to memory of 5060 4560 RdrCEF.exe 74 PID 4560 wrote to memory of 5060 4560 RdrCEF.exe 74 PID 4560 wrote to memory of 5060 4560 RdrCEF.exe 74 PID 4560 wrote to memory of 5060 4560 RdrCEF.exe 74 PID 4560 wrote to memory of 5060 4560 RdrCEF.exe 74
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Smart Manufacturing Excellence Summit 2024.pdf"1⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140432⤵
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=5144DE870CEC340463FEEE24FC46A142 --mojo-platform-channel-handle=1640 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:23⤵PID:3632
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=ADBFF044C83A27093935D404943BE311 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=ADBFF044C83A27093935D404943BE311 --renderer-client-id=2 --mojo-platform-channel-handle=1652 --allow-no-sandbox-job /prefetch:13⤵PID:5060
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=4EDEA0EA1BD1EE825CDCBCB17CD2BDA3 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=4EDEA0EA1BD1EE825CDCBCB17CD2BDA3 --renderer-client-id=4 --mojo-platform-channel-handle=2080 --allow-no-sandbox-job /prefetch:13⤵PID:4664
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=E1D4B74B55739ACC733B39A21E125470 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=E1D4B74B55739ACC733B39A21E125470 --renderer-client-id=5 --mojo-platform-channel-handle=2212 --allow-no-sandbox-job /prefetch:13⤵PID:4620
-
-