Analysis
-
max time kernel
134s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2024 21:45
Behavioral task
behavioral1
Sample
70a31f884a75236173d1ed9650a97476.pdf
Resource
win7-20231129-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
70a31f884a75236173d1ed9650a97476.pdf
Resource
win10v2004-20231215-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
70a31f884a75236173d1ed9650a97476.pdf
-
Size
34KB
-
MD5
70a31f884a75236173d1ed9650a97476
-
SHA1
7bc01da6f47ff1f6e5c73563bad5f3190c1310cf
-
SHA256
7d3c1739e8b9dc2855ec3319bd4477e559cdb0c0584beed2af94f82149752ef8
-
SHA512
526284e32a57551d5a424deddce4f0767a0f3b1a6a876be17047fc75cbbd4c81e15e0578a8940b93525ca1fa9e4d4af209418b3b517e7217b0887dd37098b520
-
SSDEEP
768:WfwelsOu5stvqNS+fK2zsyZ2ieYGFN1UxvjftDKD:XlMl+fK2zsyoxFNu1tDKD
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4376 AcroRd32.exe 4376 AcroRd32.exe 4376 AcroRd32.exe 4376 AcroRd32.exe
Processes
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\70a31f884a75236173d1ed9650a97476.pdf"1⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:4376